Privacy TechnologiesExplores privacy technologies, emphasizing the importance of protecting communication layers and discussing anti-surveillance PETS and privacy properties.
Censorship ResistanceExplores techniques for censorship resistance in the Internet and discusses solutions like CloudTransport and CovertCast.
Conditional Access IICovers conditional access, encryption, decryption, authentication, and advanced encryption standards, exploring identity-based encryption, biometrics, and attribute-based encryption.
Privacy Enhancing TechnologiesIntroduces a course on Privacy Enhancing Technologies covering various mechanisms and emphasizing privacy as a security property.
Anonymity in Decentralized SystemsExplores the significance of anonymity in decentralized systems, discussing threats to online privacy and strategies for achieving anonymity.