Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Lecture
Non-Attributable Email: Forward-Forgeable Signatures
Graph Chatbot
Related lectures (32)
Homomorphic Encryption: Delegating Calculations Securely
Explores homomorphic encryption, enabling secure computations on encrypted data without data exposure, with applications in healthcare and finance.
Internet Capsules: Opportunities and Dangers
Explores the opportunities and dangers of the internet, including encryption, surveillance, and censorship.
Privacy Technologies and Data Protection
Explores privacy technologies, data protection, surveillance risks, and Privacy Enhancing Technologies for social and institutional privacy.
Privacy technologies and data protection
Explores privacy importance, PETS, anti-surveillance technologies, and the SwissCovid case study.
Safe Machine Learning: Cryptographic Opportunities
Explores the intersection between machine learning and cryptography, focusing on safe machine learning through cryptographic tools and models.
Cybersecurity Ecosystem: Non-Profit Impact
Explores data breaches in non-profits, incident response plans, legal requirements, cybersecurity strategies, and challenges faced by organizations.
Introduction to Cryptography: One-Time Pad and Public-Key Systems
Introduces cryptography, focusing on the one-time pad and public-key systems, emphasizing privacy and authenticity in information security.
Privacy: Paradigms and Adversaries
Covers privacy paradigms, data collection by companies, legal frameworks, trust in data providers, and the security vs. privacy debate.
Privacy-preserving authentication
Explores privacy-preserving authentication methods, zero-knowledge proofs, Schnorr's proof of identification, and their real-world applications.
Data Protection Law: Principles and Rights
Covers the principles and rights of data protection law under GDPR.
Introduction to Cryptography: Fundamentals and Applications
Covers the fundamentals of cryptography, including symmetric encryption, digital signatures, and secure communication standards.
Anonymous Credentials: Binding Identity to Physical Authentication
Covers the binding of anonymous credentials to human identity through visual authentication and cryptographic protocols.
User Authentication and Best Practices
Covers user authentication, cryptography, and best practices for digital security.
Technologies for Identity & Anonymity
Explores technologies for identity and anonymity, including e-ID, social media identities, and cryptographic signatures.
Homomorphic Encryption
Explores homomorphic encryption, enabling computations on encrypted data without decryption, with practical applications in secure medical clouds.
Data Protection Law: Principles and Practices
Explores the historical development and legal aspects of data protection laws, international instruments, challenges of online tracking, legal bases for processing personal data, and privacy regulations.
Physical Side-Channel Attacks: Techniques and Countermeasures
Discusses physical side-channel attacks, their techniques, and countermeasures to protect sensitive information from being compromised.
Distributed Randomness: Drand
Explores distributed randomness using Drand, covering cryptographic tools, key exchange, elliptic curve cryptography, and practical applications in blockchain systems.
Privacy-Preserving Federated Analytics for Personalized Medicine
Delves into privacy-preserving federated analytics for personalized medicine, discussing challenges, solutions, and real-world applications.
Homomorphic Encryption: Cloud and Aggregation
Explores homomorphic encryption for secure cloud computing and data aggregation.
Previous
Page 1 of 2
Next