Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Lecture
Personal Devices: Security and Privacy
Graph Chatbot
Related lectures (32)
Privacy Technologies and Data Protection
Explores privacy technologies, data protection, surveillance risks, and Privacy Enhancing Technologies for social and institutional privacy.
Privacy technologies and data protection
Explores privacy importance, PETS, anti-surveillance technologies, and the SwissCovid case study.
Privacy-Preserving Federated Analytics for Personalized Medicine
Delves into privacy-preserving federated analytics for personalized medicine, discussing challenges, solutions, and real-world applications.
Introduction to Security and Privacy
Covers the basics of pedagogy, lesson structure, video capsules, and student evaluation.
Cloud and Aggregation: Security and Privacy
Explores cloud computing, data aggregation, security risks, privacy defenses, and data protection techniques.
Data Protection Laws in Switzerland
Covers Swiss data protection laws, including the Federal Data Protection Act and the roles defined in the legislation.
Privacy: Threat Modeling and Differential Privacy
Explores the significance of privacy, risks of targeted advertising, and the concept of differential privacy.
Homomorphic Encryption: Delegating Calculations Securely
Explores homomorphic encryption, enabling secure computations on encrypted data without data exposure, with applications in healthcare and finance.
Privacy: definition
Explores the definitions, value, and challenges of privacy, including personal data and privacy properties like pseudonymity and k-anonymity.
Privacy and Security: Online Identity and Threats
Explores online identity, privacy, and security, covering fake news, cyberbullying, and defense strategies.
Ethical Considerations in AI
Explores legal and ethical aspects of AI, focusing on autonomy, responsibility, and societal impact.
Anonymous communications
Explores the significance of anonymous communications in safeguarding privacy and security, covering challenges, applications, system design, and quantifying anonymity levels.
Abusive Data Collection: Risks and Protections
Explores risks of abusive data collection, protections like Differential Privacy, Hashing, and Encryption, and techniques for data protection.
Manipulating Opinions: Influence and Privacy
Delves into the impact of opinions, the Cambridge Analytica scandal, and practical steps to protect privacy.
Servers: Security and Privacy
Explores server security, privacy, attacks, blockchains, encryption, and defense strategies against cyber threats.
Conditional Access II
Covers conditional access, encryption, decryption, authentication, and advanced encryption standards, exploring identity-based encryption, biometrics, and attribute-based encryption.
Privacy: Protecting Personal Data and Ensuring Anonymity
Explores risks of data exposure and strategies for defending privacy.
Server Security: Threats and Defenses
Explores server security, types of attacks, consequences, and defenses, along with an introduction to blockchains.
Contact Tracing and Cryptography
Explores contact tracing in public spaces and the role of cryptography in ensuring secure and private data transmission.
Data Protection Ordinance for EPF Domain Personnel
Covers the Data Protection Ordinance for EPF domain personnel, focusing on legal responsibilities and data management.
Previous
Page 1 of 2
Next