Skip to main content
Graph
Search
fr
|
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Lecture
Homomorphic Encryption: Applications and Operations
Graph Chatbot
Related lectures (32)
Previous
Page 1 of 4
Next
Conditional Access II
Covers conditional access, encryption, decryption, authentication, and advanced encryption standards, exploring identity-based encryption, biometrics, and attribute-based encryption.
Media Security Standards
Explores the definition of media security standards and the standardization of a framework rather than a specific security tool.
Homomorphic Encryption: Delegating Calculations Securely
Explores homomorphic encryption, enabling secure computations on encrypted data without data exposure, with applications in healthcare and finance.
Trust and Privacy
Explores trust, privacy, visual protection, social media models, and blockchain technology.
Contact Tracing and Cryptography
Explores contact tracing in public spaces and the role of cryptography in ensuring secure and private data transmission.
Introduction to Security and Privacy
Covers the basics of pedagogy, lesson structure, video capsules, and student evaluation.
Personal Devices Security: Attacks and Defenses
Explores security and privacy issues in personal electronic devices, covering attacks, defenses, and consequences.
Cloud and Aggregation: Security and Privacy
Explores cloud computing, data aggregation, security risks, privacy defenses, and data protection techniques.
Privacy-Preserving Data Management: Intro and Secure Operations
Covers the motivation behind privacy-preserving data management and the intersection protocol for secure operations across private databases.
Resource-aware security and privacy in IoT domain
Explores challenges in the IoT era, resource-constrained nodes, complex algorithms, security solutions, and blockchain adoption for secure data storage.