Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Lecture
Sybil Attacks and Defenses
Graph Chatbot
Related lectures (32)
Data, big data, clouds and IoT
Explores data representation, databases, cloud computing, and challenges in the cloud environment.
Privacy-Preserving Data Management: Intro and Secure Operations
Covers the motivation behind privacy-preserving data management and the intersection protocol for secure operations across private databases.
Ethical Considerations in AI
Explores legal and ethical aspects of AI, focusing on autonomy, responsibility, and societal impact.
Privacy: Threat Modeling and Differential Privacy
Explores the significance of privacy, risks of targeted advertising, and the concept of differential privacy.
Homomorphic Cryptography: Privacy and Security
Covers the evaluation of cloud and aggregation capsules, legal framework, and student presentations on security and privacy.
Security of IoT Devices
Explores the challenges of security and privacy in the IoT era, emphasizing the risks of data collection and the need for innovative solutions.
Homomorphic Encryption: Delegating Calculations Securely
Explores homomorphic encryption, enabling secure computations on encrypted data without data exposure, with applications in healthcare and finance.
Servers: Security and Privacy
Explores server security, privacy, attacks, blockchains, encryption, and defense strategies against cyber threats.
Data Privacy and Security: Course Introduction
Covers the course introduction, teaching methods, evaluation criteria, and practical projects for data privacy and security.
Privacy: definition
Explores the definitions, value, and challenges of privacy, including personal data and privacy properties like pseudonymity and k-anonymity.
Anonymous communications
Explores the significance of anonymous communications in safeguarding privacy and security, covering challenges, applications, system design, and quantifying anonymity levels.
Biometric Research: Finger Vein Recognition Techniques
Covers advancements in finger vein recognition technology and its applications in biometric identity verification.
Previous
Page 2 of 2
Next