Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Lecture
Decentralized E-Voting: Challenges and Solutions
Graph Chatbot
Related lectures (29)
Digital Voting Systems: Security and Verifiability
Explores the security and verifiability of digital voting systems, including in-person and remote e-voting, focusing on protection against tampering and ballot counting efficiency.
E-Voting: Election Phases and Security Measures
Discusses election phases, ballot security, privacy, and transparency in e-voting.
E-Voting: Decentralized Systems for Democracy
Delves into e-voting systems, emphasizing decentralized democracy, election phases, and challenges in ensuring verifiability and security.
Electronic Voting: Processes and Approaches
Explores electronic voting processes, approaches, and technologies, emphasizing integrity, fairness, and transparency in voting systems.
E-Voting: Research and Challenges
Explores e-voting research, digital algorithms, privacy challenges, and cryptographic methods in ensuring legitimacy and participation.
Privacy Technologies and Data Protection
Explores privacy technologies, data protection, surveillance risks, and Privacy Enhancing Technologies for social and institutional privacy.
E-voting: individual verifiability
Explores individual verifiability in the e-voting system, covering verifiable protocols, zero-knowledge proofs, and vote integrity.
SwissCovid: Privacy-Preserving Contact Tracing Systems
Explores the SwissCovid contact tracing app, emphasizing privacy and security measures.
Media Security Standards
Explores the definition of media security standards and the standardization of a framework rather than a specific security tool.
Social Influence and Choice
Explores social influence, democracy, individual autonomy, equality, and decision-making models.
Introduction to Security and Privacy
Covers the basics of pedagogy, lesson structure, video capsules, and student evaluation.
Trust and Privacy
Explores trust, privacy, visual protection, social media models, and blockchain technology.
Anonymity in Communication: Tor and Cryptographic Protocols
Explores anonymity in communication, focusing on Tor, cryptographic protocols, and challenges in achieving perfect anonymity.
Cloud and Aggregation: Security and Privacy
Explores cloud computing, data aggregation, security risks, privacy defenses, and data protection techniques.
Weak Fiat-Shamir: Vulnerabilities in Cryptographic Protocols
Covers vulnerabilities in the Fiat-Shamir heuristic and its impact on Helios voting security.
Privacy and Security: Online Identity and Threats
Explores online identity, privacy, and security, covering fake news, cyberbullying, and defense strategies.
Personal Devices Security: Attacks and Defenses
Explores security and privacy issues in personal electronic devices, covering attacks, defenses, and consequences.
Conditional Access II
Covers conditional access, encryption, decryption, authentication, and advanced encryption standards, exploring identity-based encryption, biometrics, and attribute-based encryption.
Data Protection Laws in Switzerland
Covers Swiss data protection laws, including the Federal Data Protection Act and the roles defined in the legislation.
Privacy technologies and data protection
Explores privacy importance, PETS, anti-surveillance technologies, and the SwissCovid case study.
Previous
Page 1 of 2
Next