Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Lecture
Internet Capsules: Opportunities and Dangers
Graph Chatbot
Related lectures (32)
Privacy Technologies and Data Protection
Explores privacy technologies, data protection, surveillance risks, and Privacy Enhancing Technologies for social and institutional privacy.
Privacy technologies and data protection
Explores privacy importance, PETS, anti-surveillance technologies, and the SwissCovid case study.
Homomorphic Encryption: Delegating Calculations Securely
Explores homomorphic encryption, enabling secure computations on encrypted data without data exposure, with applications in healthcare and finance.
Internet Evolution: From Origins to Consequences
Explores the evolution and impact of the Internet, emphasizing the dual nature of technological advancements.
Internet Capsules: Security and Privacy
Covers internet security, privacy, TLS, blocking, filtering, surveillance, and espionage.
Conditional Access II
Covers conditional access, encryption, decryption, authentication, and advanced encryption standards, exploring identity-based encryption, biometrics, and attribute-based encryption.
Server Security: Threats and Defenses
Explores server security, types of attacks, consequences, and defenses, along with an introduction to blockchains.
Non-Attributable Email: Forward-Forgeable Signatures
Explores non-attributable email using forward-forgeable signatures and the legal risks faced by security researchers.
Cloud and Aggregation: Security and Privacy
Explores cloud computing, data aggregation, security risks, privacy defenses, and data protection techniques.
Privacy: Threat Modeling and Differential Privacy
Explores the significance of privacy, risks of targeted advertising, and the concept of differential privacy.
Personal Devices Security: Attacks and Defenses
Explores security and privacy issues in personal electronic devices, covering attacks, defenses, and consequences.
Contact Tracing and Cryptography
Explores contact tracing in public spaces and the role of cryptography in ensuring secure and private data transmission.
Personal Devices: Security and Privacy
Explores security and privacy issues in personal electronic devices, emphasizing the importance of safeguarding Personally Identifiable Information.
Introduction to Security and Privacy
Covers the basics of pedagogy, lesson structure, video capsules, and student evaluation.
Privacy: Protecting Personal Data and Ensuring Anonymity
Explores risks of data exposure and strategies for defending privacy.
Privacy: Why is privacy important
Explores the importance of privacy in democratic societies and the shared security infrastructure across individuals, industry, and governments.
Asymmetric Cryptography: Basics and Applications
Explores asymmetric cryptography basics, including encryption, signatures, and Diffie-Hellman, along with advanced topics like RSA and quantum computing implications.
Abusive Data Collection: Risks and Protections
Explores risks of abusive data collection, protections like Differential Privacy, Hashing, and Encryption, and techniques for data protection.
Privacy: Paradigms and Adversaries
Covers privacy paradigms, data collection by companies, legal frameworks, trust in data providers, and the security vs. privacy debate.
Data Protection Laws in Switzerland
Covers Swiss data protection laws, including the Federal Data Protection Act and the roles defined in the legislation.
Previous
Page 1 of 2
Next