Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Lecture
Cryptographic Hash Functions
Graph Chatbot
Related lectures (32)
Previous
Page 4 of 4
Next
Biometrics & Tokens: Advantages, Authentication, & Adversarial Reasoning
Explores biometrics, tokens, authentication processes, and adversarial reasoning in security engineering.
Bluetooth Security: Pairing Protocols
Explores Bluetooth security, focusing on pairing protocols, key recovery, and active attacks in Bluetooth 2.0 and the enhanced Bluetooth 2.1 with Secure Simple Pairing (SSP).