Explores Privacy Pass, a method to bypass internet challenges anonymously, discussing key concepts and addressing performance and scalability concerns.
Explores bug-finding, verification, and the use of learning-aided approaches in program reasoning, showcasing examples like the Heartbleed bug and differential Bayesian reasoning.
Explores the shift to secure communications through the biometric passport case study, covering RFID, identity examples, MRTD, EAC, and cryptographic protocols.
Covers the control of sulfur dioxide pressure in metallurgical processes and the complexities of pyrometallurgical extraction of copper from sulfide ores.
Covers the nextnano software for quantum simulation of nanostructures, including input structure, material doping, and self-consistent solutions for Poisson, Drift-Diffusion, and Schrödinger Equations.