Skip to main content
Graph
Search
fr
|
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Lecture
Media Security: Introduction and Overview
Graph Chatbot
Related lectures (30)
Previous
Page 2 of 3
Next
Information Security: Data Destruction/Availability Balance
Explores the balance between threat and defense in data destruction and availability.
Symmetric Encryption: Physical Limits
Explores the physical limits and security aspects of symmetric encryption schemes, including energy consumption, key recovery, and distinguisher security.
SwissCovid and Privacy
Explores SwissCovid encryption, key verification, and privacy challenges in contact tracing.
HTTP Desync: Request Smuggling Reborn
Explores HTTP request smuggling, a vulnerability to bypass security controls, with examples and defense strategies.
Security Principles: Work Factor & Compromise Recording
Explores the work factor and compromise recording principles in computer security, emphasizing cost evaluation and tamper-evident logs.
Security Testing and Spoofing
Covers security testing techniques, spoofing vulnerabilities, encryption bans, and network security properties.
Server Security: Threats and Defenses
Explores server security, types of attacks, consequences, and defenses, along with an introduction to blockchains.
Media Integrity Verification
Explores media integrity verification, digital signatures, image integrity, watermarking, and forensic analysis.
Personal Devices Security: Attacks and Defenses
Explores security and privacy issues in personal electronic devices, covering attacks, defenses, and consequences.
ECB Penguin and Hashing
Explores symmetric encryption, social engineering, and secure hashing techniques, focusing on ECB vulnerabilities and SHA-256 usage.