Explores adversarial thinking, common weaknesses, and ineffective defenses in software systems, emphasizing the importance of mitigating prevalent vulnerabilities.
Explores the definitions, history, and applications of conditional access in media security, covering user authentication techniques, smart cards, biometrics, and legal aspects.
Introduces new Identity Providers at EPFL, emphasizing user autonomy, advanced security measures, and the transition to modern authentication protocols.