Login to filter by course Login to filter by course Reset
Censorship ResistanceExplores censorship resistance in privacy technologies, techniques to avoid Internet censorship, preventing communication, and censorship resistance systems like Tor.
Cybersecurity: Myth and RealitiesExplores cybersecurity myths and realities, the typical cyberattack lifecycle, and the reasons behind the exaggeration of cyberthreats.
Privacy: definitionExplores the definitions, value, and challenges of privacy, including personal data and privacy properties like pseudonymity and k-anonymity.
Censorship ResistanceExplores techniques for censorship resistance in the Internet and discusses solutions like CloudTransport and CovertCast.
Location PrivacyExplores the sensitivity of location data, inference of points of interest, and techniques for protecting location privacy.