Skip to main content
Graph
Search
fr
|
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Lecture
Secure Multiparty Computation: Danish Sugar Beets Auction
Graph Chatbot
Related lectures (31)
Previous
Page 3 of 4
Next
Anonymous Authorization: Privacy Engineering Toolbox
Covers anonymous authorization, zero-knowledge proofs, attribute-based credentials, and practical issues in anonymous authentication.
Privacy-preserving authentication
Explores privacy-preserving authentication methods, zero-knowledge proofs, Schnorr's proof of identification, and their real-world applications.
Privacy Technologies and Data Protection
Explores privacy technologies, data protection, surveillance risks, and Privacy Enhancing Technologies for social and institutional privacy.
Authentication and Best Practices: Challenges and Solutions
Explores authentication, identity theft risks, privacy protection, and ethical data handling.
Privacy Technologies: Some Privacy Technologies (part II)
Explores anonymous communication systems, attribute-based credentials, the Tor network, and other privacy technologies.
The Power of Interaction: Zero-Knowledge Construction
Explores zero-knowledge construction, setup models, and the power of interaction in cryptographic protocols, including Sigma Protocol and NP Zero-Knowledge Proofs.
Privacy technologies and data protection
Explores privacy importance, PETS, anti-surveillance technologies, and the SwissCovid case study.
Trust and Privacy
Explores trust, privacy, visual protection, social media models, and blockchain technology.
Privacy: Threat Modeling and Differential Privacy
Explores the significance of privacy, risks of targeted advertising, and the concept of differential privacy.
Introduction to Cryptography: Fundamentals and Applications
Covers the fundamentals of cryptography, including symmetric encryption, digital signatures, and secure communication standards.