Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Lecture
Anonymous Communication: Motivations and Approaches
Graph Chatbot
Related lectures (32)
Technologies for Identity & Anonymity
Explores technologies for identity and anonymity, including e-ID, social media identities, and cryptographic signatures.
Privacy Technologies: Some Privacy Technologies (part II)
Explores anonymous communication systems, attribute-based credentials, the Tor network, and other privacy technologies.
Anonymous communications: Quantifying Anonymity
Delves into quantifying anonymity, naive approaches, DC-networks, and resolving collisions.
Anonymity Online: Techniques and Weaknesses
Explores online anonymity techniques and weaknesses, including bypassing geo-blocking and avoiding tracking.
Anonymous Communications: Technologies and Challenges
Explores the challenges and technologies of anonymous communications, emphasizing the importance of privacy in modern communication systems.
Anonymous Communications: Tor and Internet Privacy
Examines anonymous communications using Tor to protect privacy and navigate internet censorship, discussing its history, functionality, and limitations.
Anonymity in Communication: Tor and Cryptographic Protocols
Explores anonymity in communication, focusing on Tor, cryptographic protocols, and challenges in achieving perfect anonymity.
Anonymous Communications: Mix Networks and Tor
Explores anonymous communications using mix networks and Tor, emphasizing privacy, metadata vulnerability, and network design challenges.
Contact Tracing and Cryptography
Explores contact tracing in public spaces and the role of cryptography in ensuring secure and private data transmission.
Anonymous Communications: Toolbox for Privacy Engineering
Covers the toolbox for privacy engineering, focusing on anonymous communications and the challenges with encryption and metadata encoding.
Safe Machine Learning: Cryptographic Opportunities
Explores the intersection between machine learning and cryptography, focusing on safe machine learning through cryptographic tools and models.
Privacy-Preserving Systems: Anonymity and Security
Explores online privacy, threats to anonymity, metadata implications, and approaches to achieve privacy.
Homomorphic Encryption: Delegating Calculations Securely
Explores homomorphic encryption, enabling secure computations on encrypted data without data exposure, with applications in healthcare and finance.
Privacy technologies and data protection
Explores privacy importance, PETS, anti-surveillance technologies, and the SwissCovid case study.
Online Tracking: Stateful vs. Stateless Methods
Explores online tracking methods, including canvas and AudioContext API fingerprinting, and their privacy implications.
Anonymous Credentials: Binding Identity to Physical Authentication
Covers the binding of anonymous credentials to human identity through visual authentication and cryptographic protocols.
Censorship Resistance
Explores censorship resistance technologies to ensure freedom of expression and access to information online.
Anonymous Authorization: Privacy Engineering Toolbox
Covers anonymous authorization, zero-knowledge proofs, attribute-based credentials, and practical issues in anonymous authentication.
Privacy Enhancing Technologies
Introduces a course on Privacy Enhancing Technologies covering various mechanisms and emphasizing privacy as a security property.
Homomorphic Encryption: Cloud and Aggregation
Explores homomorphic encryption for secure cloud computing and data aggregation.
Previous
Page 1 of 2
Next