Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Concept
Contactless smart card
Applied sciences
Computer engineering
Computer security
Identity management
Graph Chatbot
Related lectures (6)
Login to filter by course
Login to filter by course
Reset
Conditional Access I
Explores the definitions, history, and applications of conditional access in media security, covering user authentication techniques, smart cards, biometrics, and legal aspects.
Biometrics & Tokens: Advantages, Authentication, & Adversarial Reasoning
Explores biometrics, tokens, authentication processes, and adversarial reasoning in security engineering.
Anonymous Credentials: Binding Identity to Physical Authentication
Covers the binding of anonymous credentials to human identity through visual authentication and cryptographic protocols.
Public-Key Cryptography: ECDSA and BLS
Explores ECDSA and BLS signature schemes, NFC credit card payment, and breaking RSA and DH cryptography.
Authentication - Tokens
Covers the concept of tokens, how they work, and the implementation of two-factor authentication.
Authentication: Basics
Covers the process of verifying identity, traditional methods like passwords, and modern approaches such as biometrics.
Previous
Page 1 of 1
Next