Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Lecture
Service Desk Portal
Graph Chatbot
Related lectures (32)
Previous
Page 3 of 4
Next
Mobile Telephony Security
Explores the security challenges and improvements in mobile telephony, covering encryption algorithms, protocols, and integrity/authentication issues.
Entity & Information Extraction
Explores knowledge extraction from text, covering key concepts like keyphrase extraction and named entity recognition.
Knowledge Inference
Explores knowledge inference, embedding techniques, and schema matching in data integration.
Knowledge Representation: Semantics and Data Structures
Explores knowledge representation, data structures, semantics, and the challenges of searching for data on the web.
Authentication and Best Practices: Challenges and Solutions
Explores authentication, identity theft risks, privacy protection, and ethical data handling.
Authentication: Basics
Covers the process of verifying identity, traditional methods like passwords, and modern approaches such as biometrics.
Access Control Policies: Authentication and Authorization
Explores access control policies, authentication methods, and the principles of least privilege, emphasizing the importance of secure and user-friendly authentication protocols.
Cryptography Basics
Covers authentication, authorization, encryption techniques, vulnerabilities, and the impact of quantum computing on cryptography.
Cryptographic Hash Functions and Block Chains
Covers cryptographic hash functions, message authentication codes, and block chains, including bitcoins, proof-of-work, and MAC variants.
Asymmetric Cryptography and Password-based Authentication
Covers asymmetric cryptography, hybrid encryption, Diffie-Hellman key exchange, authentication challenges, secure password storage, and transfer methods.