Skip to main content
Graph
Search
fr
|
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Lecture
Authentication Means and Best Practices
Graph Chatbot
Related lectures (31)
Previous
Page 3 of 4
Next
Mobile Telephony Security
Explores the security challenges and improvements in mobile telephony, covering encryption algorithms, protocols, and integrity/authentication issues.
Conditional Access II
Covers conditional access, encryption, decryption, authentication, and advanced encryption standards, exploring identity-based encryption, biometrics, and attribute-based encryption.
Bluetooth Security: Pairing Protocols
Explores Bluetooth security, focusing on pairing protocols, key recovery, and active attacks in Bluetooth 2.0 and the enhanced Bluetooth 2.1 with Secure Simple Pairing (SSP).
Introduction to Cryptography: Fundamentals and Applications
Covers the fundamentals of cryptography, including symmetric encryption, digital signatures, and secure communication standards.
Cryptographic Hash Functions and Block Chains
Covers cryptographic hash functions, message authentication codes, and block chains, including bitcoins, proof-of-work, and MAC variants.
BioLocker: A Practical Biometric Authentication Mechanism based on 3D Fingervein
Presents BioLocker, a biometric authentication system using 3D finger vein recognition, covering principles, algorithms, security, and future work.
Untitled
Watermarking: Hide Invisible Digital Signature
Explores the concept of hiding an invisible digital signature within media and the challenges of robustness and imperceptibility in watermarking.
Biometric Research: Finger Vein Recognition Techniques
Covers advancements in finger vein recognition technology and its applications in biometric identity verification.
Phishing: Recognizing Email Scams
Covers how to recognize email scams, including impersonal signatures and urgent messages.