Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Lecture
Security and Privacy Challenges in IoT Era
Graph Chatbot
Related lectures (32)
Previous
Page 3 of 4
Next
Privacy: definition
Explores the definitions, value, and challenges of privacy, including personal data and privacy properties like pseudonymity and k-anonymity.
Security of IoT Devices
Explores the challenges of security and privacy in the IoT era, emphasizing the risks of data collection and the need for innovative solutions.
Anonymous communications
Explores the significance of anonymous communications in safeguarding privacy and security, covering challenges, applications, system design, and quantifying anonymity levels.
Privacy: Threat Modeling and Differential Privacy
Explores the significance of privacy, risks of targeted advertising, and the concept of differential privacy.
Homomorphic Cryptography: Privacy and Security
Covers the evaluation of cloud and aggregation capsules, legal framework, and student presentations on security and privacy.
Data Privacy and Security: Course Introduction
Covers the course introduction, teaching methods, evaluation criteria, and practical projects for data privacy and security.
Privacy-preserving Data Management: Operations and Protocols
Explores privacy-preserving data management operations and summarization techniques for sensitive data protection.
Security Principles: Work Factor & Compromise Recording
Explores the work factor and compromise recording principles in computer security, emphasizing cost evaluation and tamper-evident logs.
Homomorphic Encryption: Applications and Operations
Explores legal aspects, security, and privacy in homomorphic encryption, covering elliptic curves, encoding, and practical applications.
Espionage and Security: Insights and Examples
Explores espionage cases, intelligence activities, and surveillance systems, emphasizing security implications and potential targets for espionage.