Lecture

Basics - Security Engineering Concepts

Related lectures (31)
Deformable Structures II
Explores hyperstatic structures, pre-stressed structures, and geometric linearity.
Conditional Access II
Covers conditional access, encryption, decryption, authentication, and advanced encryption standards, exploring identity-based encryption, biometrics, and attribute-based encryption.
Redox Reactions: Half-Reactions, Potentials, and Applications
Explores redox reactions, electrode potentials, and their practical uses in electrochemistry.
Adversarial Thinking: Defender - Threat Modelling
Delves into adversarial thinking and threat modeling methodologies to enhance defense strategies.
Quantum Key Distribution
Covers the BB84 Quantum Key Distribution protocol for secure key establishment.
Trust and Privacy
Explores trust, privacy, visual protection, social media models, and blockchain technology.
Biometrics & Tokens: Advantages, Authentication, & Adversarial Reasoning
Explores biometrics, tokens, authentication processes, and adversarial reasoning in security engineering.
Media Security Standards
Explores the definition of media security standards and the standardization of a framework rather than a specific security tool.
Servers: Security and Privacy
Explores server security, privacy, attacks, blockchains, encryption, and defense strategies against cyber threats.
Linear Elasticity: 3D
Covers linearity between stress and strain in 3D and isotropic linear elasticity equations.

Graph Chatbot

Chat with Graph Search

Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.

DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.