Skip to main content
Graph
Search
fr
|
en
Switch to dark mode
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Lecture
5G Authentication: Security and SUKI
Graph Chatbot
Related lectures (26)
Previous
Page 3 of 3
Next
Authentication - Biometrics
Covers the concept of biometrics, the process of enrolling and verifying biometrics, and the importance of balancing false positives and false negatives.
IT Security Challenges
Explores IT security challenges, Object Storage systems, website management transition, network security deployment, and project portfolio management at EPFL.
Protecting Your Work and EPFL
Emphasizes protecting work and EPFL through laws, regulations, identifying threats, and securing hardware.
Nano-Tera: Engineering the Future
Covers engineering multi-scale systems for health, security, energy, and the environment, focusing on taking innovation from labs to daily life.
Security Principles: Work Factor & Compromise Recording
Explores the work factor and compromise recording principles in computer security, emphasizing cost evaluation and tamper-evident logs.
Cybersecurity: Threat Modeling and Solutions
Explores cybersecurity fundamentals, threat modeling, real-world case studies, and digital forensics procedures.