Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Lecture
Untitled
Graph Chatbot
Related lectures (31)
Conditional Access II
Covers conditional access, encryption, decryption, authentication, and advanced encryption standards, exploring identity-based encryption, biometrics, and attribute-based encryption.
Trust and Privacy
Explores trust, privacy, visual protection, social media models, and blockchain technology.
Privacy Technologies and Data Protection
Explores privacy technologies, data protection, surveillance risks, and Privacy Enhancing Technologies for social and institutional privacy.
Information Security: Communication, Calculation, Threats
Explores information security in communication, calculation, and digital threats, emphasizing data protection and access control.
Media Security Standards
Explores the definition of media security standards and the standardization of a framework rather than a specific security tool.
Cybersecurity: Threat Modeling and Solutions
Explores cybersecurity fundamentals, threat modeling, real-world case studies, and digital forensics procedures.
Data Protection Laws in Switzerland
Covers Swiss data protection laws, including the Federal Data Protection Act and the roles defined in the legislation.
Machine Learning in Philanthropy and Non-Profit
Delves into the application of machine learning in enhancing human rights documentation and advocacy for organizations like HURIDOCS.
Protecting Your Work and EPFL
Emphasizes protecting work and EPFL through laws, regulations, identifying threats, and securing hardware.
Digital Contact Tracing: The Dark Side
Explores the challenges and vulnerabilities of digital contact tracing technology, focusing on the SwissCovid app and its implications.
Privacy technologies and data protection
Explores privacy importance, PETS, anti-surveillance technologies, and the SwissCovid case study.
Personal Devices Security: Attacks and Defenses
Explores security and privacy issues in personal electronic devices, covering attacks, defenses, and consequences.
Data, big data, clouds and IoT
Explores data representation, databases, cloud computing, and challenges in the cloud environment.
Privacy and Security: Online Identity and Threats
Explores online identity, privacy, and security, covering fake news, cyberbullying, and defense strategies.
Personal Devices: Security and Privacy
Explores security and privacy issues in personal electronic devices, emphasizing the importance of safeguarding Personally Identifiable Information.
Conditional Access I
Explores the definitions, history, and applications of conditional access in media security, covering user authentication techniques, smart cards, biometrics, and legal aspects.
Privacy: Threat Modeling and Differential Privacy
Explores the significance of privacy, risks of targeted advertising, and the concept of differential privacy.
Introduction to Security and Privacy
Covers the basics of pedagogy, lesson structure, video capsules, and student evaluation.
Cloud and Aggregation: Security and Privacy
Explores cloud computing, data aggregation, security risks, privacy defenses, and data protection techniques.
Privacy-Preserving Federated Analytics for Personalized Medicine
Delves into privacy-preserving federated analytics for personalized medicine, discussing challenges, solutions, and real-world applications.
Previous
Page 1 of 2
Next