Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Lecture
Homomorphic Encryption: Cloud and Aggregation
Graph Chatbot
Related lectures (31)
Time-Lock Encryption: Practical Applications and Algorithms
Provides an overview of time-lock encryption and its practical applications, focusing on threshold time-lock encryption algorithms and their security properties.
Building End-to-End-Encrypted Systems
Explores challenges in building secure end-to-end-encrypted systems and proposes new cryptographic solutions to enhance data security.
Conditional Access II
Covers conditional access, encryption, decryption, authentication, and advanced encryption standards, exploring identity-based encryption, biometrics, and attribute-based encryption.
Physical Side-Channel Attacks: Techniques and Countermeasures
Discusses physical side-channel attacks, their techniques, and countermeasures to protect sensitive information from being compromised.
Privacy: Paradigms and Adversaries
Covers privacy paradigms, data collection by companies, legal frameworks, trust in data providers, and the security vs. privacy debate.
Cloud and Aggregation: Security and Privacy
Explores cloud computing, data aggregation, security risks, privacy defenses, and data protection techniques.
Personal Devices: Security and Privacy
Explores security and privacy issues in personal electronic devices, emphasizing the importance of safeguarding Personally Identifiable Information.
Abusive Data Collection: Risks and Protections
Explores risks of abusive data collection, protections like Differential Privacy, Hashing, and Encryption, and techniques for data protection.
RSA Encryption: Principles and Applications
Explores RSA encryption principles, factorization challenges, and practical applications in data security.
Data Protection Law: Principles and Rights
Covers the principles and rights of data protection law under GDPR.
Privacy Sphere and Data Protection
Covers privacy sphere, data protection, risks of data misuse, laws, and real-world breach cases.
Previous
Page 2 of 2
Next