Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Concept
Human security
Social sciences
Economics
Macroeconomics
International development
Graph Chatbot
Related lectures (18)
Login to filter by course
Login to filter by course
Reset
Modern Enemies
Explores the challenge of identifying and combating modern non-state adversaries.
Security and Privacy Challenges in IoT Era
Discusses security challenges in IoT, covering bug injection, code hardening, and testing techniques.
Decentralized Systems: Introduction
Covers the basics of decentralized systems, including examples, goals, and the course syllabus.
Security and Privacy in IoT Era
Covers security challenges in IoT, real-world attacks, defense concepts, and sensor security.
Energy Transition Consulting
Presents insights from an EPFL alumni on energy transition consulting for municipalities.
Cloud Computing: Overview and Security Challenges
Introduces cloud computing, its importance, deployment models, architecture, and security challenges.
Network Access Control: Security Overview
Provides an overview of Network Access Control (NAC) and security challenges discussed at the 2022 Forum SI.
Decentralized Systems Engineering
Explores the challenges and examples of decentralized systems like BitTorrent and Ethereum.
Cybersecurity Fundamentals
Covers the basics of cybersecurity, including the importance of protecting systems from digital attacks and the motivation behind cybercrimes.
Basics - Security Engineering Concepts
Covers security mechanisms, defense in depth, and methods to show systems are secure.
Security Best Practices: Authentication and Good Conduct
Discusses security best practices, such as creating secure passwords and protecting personal networks.
Machine Learning in Human Rights: Case Studies and Considerations
Delves into the application of machine learning in human rights investigations, emphasizing transparency, trust, and ethical considerations.
Canonical Transformations: Existence and Equations
Explores canonical transformations, focusing on existence, equations, simplicity, and differential equations' theory.
Public Key Cryptography: RSA
Explores public key cryptography, focusing on RSA, key generation, encryption, decryption, security challenges, and vulnerabilities.
Security Principles: Least Privilege, Common Mechanism, Acceptability
Explores security principles like least privilege, common mechanism, and user acceptability to enhance system protection.
NFC Security Research with NFCGate
Explores NFC technology, NFCGate toolkit, security breaches, analysis tools, and counter-measures to enhance NFC security.
Zero Trust Architecture: Myths and Realities
Explores the myths and realities of Zero Trust Architecture in cybersecurity, emphasizing the importance of trust establishment and dispelling common misconceptions.
Diffie-Hellman Cryptography: Key Exchange and ElGamal Encryption
Covers the Diffie-Hellman key exchange protocol and the ElGamal public-key cryptosystem.
Previous
Page 1 of 1
Next