Skip to main content
Graph
Search
fr
|
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Lecture
Information Security: Data Destruction/Availability Balance
Graph Chatbot
Related lectures (31)
Previous
Page 2 of 4
Next
Physical Side-Channel Attacks: Techniques and Countermeasures
Discusses physical side-channel attacks, their techniques, and countermeasures to protect sensitive information from being compromised.
Time-Lock Encryption: Practical Applications and Algorithms
Provides an overview of time-lock encryption and its practical applications, focusing on threshold time-lock encryption algorithms and their security properties.
Security Best Practices: Authentication and Good Conduct
Discusses security best practices, such as creating secure passwords and protecting personal networks.
Internet Evolution: From Origins to Consequences
Explores the evolution and impact of the Internet, emphasizing the dual nature of technological advancements.
Data Security and Privacy: Practical Exercises and Concepts
Covers encryption, data protection, and blockchain technology, with hands-on exercises for practical application.
Abusive Data Collection: Risks and Protections
Explores risks of abusive data collection, protections like Differential Privacy, Hashing, and Encryption, and techniques for data protection.
Homomorphic Encryption
Explores homomorphic encryption, enabling computations on encrypted data without decryption, with practical applications in secure medical clouds.
Quantum Key Distribution, Dense Coding, Teleportation
Covers QKD, Dense Coding, and Teleportation, explaining attacks, basis choices, and security tests.
Security Testing and Spoofing
Covers security testing techniques, spoofing vulnerabilities, encryption bans, and network security properties.
Security Measures: Data Protection
Highlights the importance of securing electronic devices and data in public places.