Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Lecture
Sybil Attacks and Defenses
Graph Chatbot
Related lectures (32)
Previous
Page 1 of 4
Next
Sybil Attacks and Defenses
Explores Sybil attacks, fake content creation, and defenses against online identity fraud.
Privacy and Security: Online Identity and Threats
Explores online identity, privacy, and security, covering fake news, cyberbullying, and defense strategies.
Conditional Access II
Covers conditional access, encryption, decryption, authentication, and advanced encryption standards, exploring identity-based encryption, biometrics, and attribute-based encryption.
Technologies for Identity & Anonymity
Explores technologies for identity and anonymity, including e-ID, social media identities, and cryptographic signatures.
Media Security Standards
Explores the definition of media security standards and the standardization of a framework rather than a specific security tool.
Introduction to Security and Privacy
Covers the basics of pedagogy, lesson structure, video capsules, and student evaluation.
Trust and Privacy
Explores trust, privacy, visual protection, social media models, and blockchain technology.
Privacy Technologies and Data Protection
Explores privacy technologies, data protection, surveillance risks, and Privacy Enhancing Technologies for social and institutional privacy.
Resource-aware security and privacy in IoT domain
Explores challenges in the IoT era, resource-constrained nodes, complex algorithms, security solutions, and blockchain adoption for secure data storage.
Recent Biometrics
Explores the basics, benefits, risks, and global impact of recent biometrics technology.