Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Lecture
Access Control: Password-based Cryptography
Graph Chatbot
Related lectures (31)
Security Design Principles: Preliminaries
Covers basic security concepts, adversarial thinking, security mechanisms, and responsible conduct in security design principles.
Biometric Research: Finger Vein Recognition Techniques
Covers advancements in finger vein recognition technology and its applications in biometric identity verification.
Stream Ciphers: Buteforce Inversion Algorithms
Explores stream ciphers, buteforce inversion algorithms, key recovery games, and attacks in cryptography.
Post-Quantum Cryptography: Formalism and Access Control
Covers the formalism of post-quantum cryptography and access control mechanisms.
Gitlab Agent for Kubernetes (`agentk`)
Covers the setup of a Gitlab agent for Kubernetes, focusing on installation, version control, and troubleshooting.
Cryptographic Security Fundamentals
Covers cryptographic security fundamentals, including collision search algorithms, public-key cryptography, and risks of underestimating collision attacks.
Trust Establishment: Cryptography and Security
Explores trust establishment in cryptography and security, covering secure channels, PKI vulnerabilities, and diverse cryptographic models.
Introduction to Cryptography: Fundamentals and Applications
Covers the fundamentals of cryptography, including symmetric encryption, digital signatures, and secure communication standards.
Access control: introduction
Covers the concept of access control in computer security, its importance, implementation, and policy decision approaches.
Discretionary Access Control: Linux and Windows
Explores access control in Linux and Windows, covering Unix user identities, file access control lists, special users, super users, and Windows' discretionary access control lists.
Actor Composition: Patterns and Strategies
Explores actor composition, fundamental patterns, result aggregation, risk delegation, and façade strategies in actor systems.
Previous
Page 2 of 2
Next