Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Lecture
Secure Multiparty Computation: Oblivious Transfer
Graph Chatbot
Related lectures (32)
Previous
Page 2 of 4
Next
Privacy Preserving Crypto I: Secure Multi-Party Computation
Explores Secure Multi-Party Computation, cryptographic techniques, threat models, additive secret shares, and real-world applications of privacy-preserving protocols.
Privacy Technologies and Data Protection
Explores privacy technologies, data protection, surveillance risks, and Privacy Enhancing Technologies for social and institutional privacy.
Trust and Privacy
Explores trust, privacy, visual protection, social media models, and blockchain technology.
Personal Devices Security: Attacks and Defenses
Explores security and privacy issues in personal electronic devices, covering attacks, defenses, and consequences.
Homomorphic Encryption: Applications and Implementations
Explores homomorphic encryption, its applications, challenges, and comparisons with Trusted Execution Environments, as well as the use of aggregated keys for secure data sharing.
Contact Tracing and Cryptography
Explores contact tracing in public spaces and the role of cryptography in ensuring secure and private data transmission.
Privacy technologies and data protection
Explores privacy importance, PETS, anti-surveillance technologies, and the SwissCovid case study.
Swiss COVID: Security and Privacy
Explores the security and privacy challenges of the Swiss COVID contact tracing app, including fake notifications and time-based attacks.
How to Ensure Privacy in IoT Domain
Discusses Defense in Depth and various strategies for ensuring privacy in IoT networks.
Internet Capsules: Security and Privacy
Covers internet security, privacy, TLS, blocking, filtering, surveillance, and espionage.