Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Concept
IPsec
Applied sciences
Computer engineering
Computer networks
Internet protocol suite
Graph Chatbot
Related lectures (12)
Login to filter by course
Login to filter by course
Reset
Network Security: IP Security
Covers IP basics, vulnerabilities like IP spoofing, and the use of IPSec for Virtual Private Networks.
ServiceNow: Forms Overview
Covers ServiceNow forms, users, incidents management, and more.
Network Security: DNS, BGP, IP, TCP, TLS
Covers IP routing, DNS spoofing, BGP security weaknesses, and defense mechanisms against network attacks.
Moscow e-Voting: Encryption Scheme Breakdown
Explores the vulnerabilities of the Moscow Internet Voting System and the fixes implemented after attacks on the encryption scheme.
Security Protocols in Practice
Explores the practical implementation of security protocols using the biometric passport as a case study, covering vulnerabilities, TLS evolution, and ChaChaPoly encryption.
Patent Management
Explores the history, principles, elements, and costs of patents, emphasizing the importance of inventorship and the modern patent system.
Trust Establishment: Bluetooth Security
Explores trust establishment in Bluetooth security, covering protocols, vulnerabilities, countermeasures, and security features.
Bluetooth Security Protocols
Explores Bluetooth security protocols, focusing on secure pairing and preventing active attacks.
Secure Communications: TLS and Security Protocols
Explores TLS, security protocols, synchronization, fair termination, and secure communication applications.
Access Control: Password-based Cryptography
Explores access control and password-based cryptography, including challenges, biometrics, and the biometric passport case study.
Network Security: Denial of Service
Explores Denial of Service attacks, prevention techniques, and various attack examples in network security.
Anonymous Credentials: Binding Identity to Physical Authentication
Covers the binding of anonymous credentials to human identity through visual authentication and cryptographic protocols.
Previous
Page 1 of 1
Next