Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Lecture
Privacy Technologies: Some Privacy Technologies (part II)
Graph Chatbot
Related lectures (32)
Anonymous Communication: Motivations and Approaches
Explores motivations for anonymous communication and various approaches to achieve anonymity.
Technologies for Identity & Anonymity
Explores technologies for identity and anonymity, including e-ID, social media identities, and cryptographic signatures.
Privacy technologies and data protection
Explores privacy importance, PETS, anti-surveillance technologies, and the SwissCovid case study.
Transition to Smart Cities: Data/Digital Layer
Delves into the importance of the data layer in Smart Cities transition.
Anonymous communications: Quantifying Anonymity
Delves into quantifying anonymity, naive approaches, DC-networks, and resolving collisions.
Anonymous Authorization: Privacy Engineering Toolbox
Covers anonymous authorization, zero-knowledge proofs, attribute-based credentials, and practical issues in anonymous authentication.
Privacy Technologies and Data Protection
Explores privacy technologies, data protection, surveillance risks, and Privacy Enhancing Technologies for social and institutional privacy.
Privacy Enhancing Technologies
Introduces a course on Privacy Enhancing Technologies covering various mechanisms and emphasizing privacy as a security property.
Homomorphic Encryption: Cloud and Aggregation
Explores homomorphic encryption for secure cloud computing and data aggregation.
Anonymous Communications: Technologies and Challenges
Explores the challenges and technologies of anonymous communications, emphasizing the importance of privacy in modern communication systems.
Anonymous Communications: Toolbox for Privacy Engineering
Covers the toolbox for privacy engineering, focusing on anonymous communications and the challenges with encryption and metadata encoding.
Smart Urban Transportation Systems: The Shift Pathway
Explores the shift pathway in smart urban transportation systems, focusing on new mobility services and their integration.
Anonymous Communications: Tor and Internet Privacy
Examines anonymous communications using Tor to protect privacy and navigate internet censorship, discussing its history, functionality, and limitations.
Homomorphic Encryption
Introduces homomorphic encryption, enabling computation on encrypted data without decryption, covering security, applications, and practical aspects.
Privacy-Preserving Systems: Anonymity and Security
Explores online privacy, threats to anonymity, metadata implications, and approaches to achieve privacy.
Anonymous Communications: Mix Networks and Tor
Explores anonymous communications using mix networks and Tor, emphasizing privacy, metadata vulnerability, and network design challenges.
Homomorphic Encryption
Explores homomorphic encryption, enabling computations on encrypted data without decryption, with practical applications in secure medical clouds.
Networking Fundamentals: Basics and Protocols
Introduces networking basics, communication protocols, routing mechanisms, web design concepts, and security risks.
Internet Capsules: Opportunities and Dangers
Explores the opportunities and dangers of the internet, including encryption, surveillance, and censorship.
Privacy: Threat Modeling and Differential Privacy
Explores the significance of privacy, risks of targeted advertising, and the concept of differential privacy.
Previous
Page 1 of 2
Next