Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Lecture
User Authentication and Best Practices
Graph Chatbot
Related lectures (29)
Previous
Page 3 of 3
Next
Information Security: Communication, Calculation, Threats
Explores information security in communication, calculation, and digital threats, emphasizing data protection and access control.
Physical Side-Channel Attacks: Techniques and Countermeasures
Discusses physical side-channel attacks, their techniques, and countermeasures to protect sensitive information from being compromised.
Time-Lock Encryption: Practical Applications and Algorithms
Provides an overview of time-lock encryption and its practical applications, focusing on threshold time-lock encryption algorithms and their security properties.
Privacy technologies and data protection
Explores privacy importance, PETS, anti-surveillance technologies, and the SwissCovid case study.
Public-Key Cryptography: Key Exchange and Signatures
Explores public-key cryptography, key exchange, and digital signatures, discussing practical applications and security mechanisms.
Security Measures: Data Protection
Highlights the importance of securing electronic devices and data in public places.
Personal Devices: Security and Privacy
Explores security and privacy issues in personal electronic devices, emphasizing the importance of safeguarding Personally Identifiable Information.
Privacy-preserving authentication
Explores privacy-preserving authentication methods, zero-knowledge proofs, Schnorr's proof of identification, and their real-world applications.
Data Protection Ordinance for EPF Domain Personnel
Covers the Data Protection Ordinance for EPF domain personnel, focusing on legal responsibilities and data management.