Главная
Study mode:
on
You
History
Saved
In progress
0 courses
compleat
0 courses
#Art & Design
#Adobe
#ChatGPT
#GitHub
#Adaptive Security
YouTube
education
Showing:
17
courses
Sort by Relevancy
Highest rated
Lowest rated
Most recently added
Ekoparty Security Conference
Seguridad sin Imaginación es una Vulnerabilidad - Masterclass
0
rewiews
Exploración de la adaptabilidad y creatividad en ciberseguridad, abordando desafíos desde perspectivas innovadoras para encontrar soluciones más efectivas en un entorno en constante evolución.
Add to list
1
Lesons
55 minutes
On-Demand
Free-Video
Thinking Outside the Bunker - Security as a Practice, Not a Target
0
rewiews
Explore innovative approaches to cybersecurity, shifting focus from target-based to practice-oriented strategies for more effective and proactive protection.
Add to list
1
Lesons
23 minutes
On-Demand
Free-Video
CNCF [Cloud Native Computing Foundation]
Evasive Maneuvers - Strategies to Overcome Runtime Detection Tools
0
rewiews
Explore innovative evasion strategies against runtime detection tools, from obfuscation to behavioral camouflage. Gain insights into evolving threat actor tactics and the importance of adaptive security measures.
Add to list
1
Lesons
30 minutes
On-Demand
Free-Video
LeadDev
Software Security as a Force of Nature
0
rewiews
Explore effective principles and practices for sustaining systems resilience, drawing inspiration from nature, human adaptations, and engineering practices.
Add to list
1
Lesons
32 minutes
On-Demand
Free-Video
Squid: Schools for Quantum Information Development
Secret Sharing with Certified Deletion
0
rewiews
Explore groundbreaking quantum secret sharing techniques that enable verifiable destruction of quantum shares while maintaining security, even against adversaries who collect authorized share sets.
Add to list
1
Lesons
27 minutes
On-Demand
Free-Video
TheIACR
Secure Updatable Encryption with Adaptive Security - AC 2023
0
rewiews
Explore cutting-edge techniques in updatable encryption with adaptive security, focusing on CCA-1 security in modern cryptographic systems.
Add to list
1
Lesons
25 minutes
On-Demand
Free-Video
TheIACR
Welcome - Functional Encryption and Identity Based Encryption
0
rewiews
Explore functional encryption and identity-based encryption concepts, including attribute-based encryption, adaptive security, and verifiability in cryptographic systems.
Add to list
18
Lesons
1 hour 23 minutes
On-Demand
Free-Video
TheIACR
Multi-Party Computation 1
0
rewiews
Explore multi-party computation fundamentals, adaptive security, and practical applications in this comprehensive overview of secure collaborative data analysis techniques.
Add to list
7
Lesons
53 minutes
On-Demand
Free-Video
IEEE
Ouroboros Crypsinous Privacy Preserving Proof of Stake
0
rewiews
Explore privacy-preserving proof-of-stake blockchain protocol, focusing on adaptive security and novel cryptographic techniques for enhanced privacy in decentralized systems.
Add to list
10
Lesons
18 minutes
On-Demand
Free-Video
TheIACR
Crypto 2023 Best Paper Plenary - Fast Lattice Reduction and Adaptive Schnorr Signatures
0
rewiews
Plenary session showcasing two award-winning papers on lattice reduction and Schnorr threshold signatures, exploring advancements in cryptography and their practical applications.
Add to list
28
Lesons
52 minutes
On-Demand
Free-Video
TheIACR
Multi-party Computation II - Session 12
0
rewiews
Explore advanced multi-party computation techniques, including adaptive security, efficient arguments, and polynomial commitments. Learn about new results and applications in cryptography.
Add to list
19
Lesons
56 minutes
On-Demand
Free-Video
TheIACR
Non-Interactive Zero Knowledge: Adaptive Security and Challenges - Asiacrypt 2022
0
rewiews
Explore non-interactive zero knowledge, adaptive security, and advanced cryptographic concepts in this comprehensive session from Asiacrypt 2022.
Add to list
24
Lesons
1 hour
On-Demand
Free-Video
TheIACR
From Selective to Adaptive Security in Functional Encryption
0
rewiews
Explore adaptive security in functional encryption, covering formalization, theorems, and security proofs for advanced cryptographic schemes.
Add to list
18
Lesons
23 minutes
On-Demand
Free-Video
TheIACR
On the Power of Hierarchical Identity-Based Encryption
0
rewiews
Explore hierarchical identity-based encryption, its security definitions, black-box separations, and compression techniques. Learn about adaptive security issues and their solutions.
Add to list
9
Lesons
26 minutes
On-Demand
Free-Video
TheIACR
Partitioning via Non Linear Polynomial Functions - More Compact IBEs from Ideal Lattices
0
rewiews
Explore advanced cryptography concepts including adaptive security, simulation trapdoors, and Fourier IBE in this technical talk on partitioning via non-linear polynomial functions for compact IBEs from ideal lattices.
Add to list
23
Lesons
27 minutes
On-Demand
Free-Video
TheIACR
Multi-Party Computation 3
0
rewiews
Explore advanced multi-party computation techniques, including oblivious key-value stores, preprocessing methods, verification protocols, and adaptive security limitations.
Add to list
8
Lesons
43 minutes
On-Demand
Free-Video
CNCF [Cloud Native Computing Foundation]
Unknown Unknowns and Chaos - Introduction to Security Chaos Engineering
0
rewiews
Explore Security Chaos Engineering's focus on "unknown unknowns" in cloud-native systems. Learn proactive security testing techniques and build resilient cyber defenses against unforeseen threats.
Add to list
1
Lesons
28 minutes
On-Demand
Free-Video
load more...