Главная
Study mode:
on
You
History
Saved
In progress
0 courses
compleat
0 courses
#Art & Design
#Adobe
#ChatGPT
#GitHub
#Security Models
YouTube
education
Showing:
28
courses
Sort by Relevancy
Highest rated
Lowest rated
Most recently added
IEEE
Real-World Snapshots vs. Theory - Questioning the t-Probing Security Model
0
rewiews
Explore the limitations of the t-probing security model through real-world laser logic state imaging, examining its implications for configurable logic and image extraction.
Add to list
12
Lesons
15 minutes
On-Demand
Free-Video
OWASP Foundation
The Evil Friend in Your Browser - Browser Extension Security Risks
0
rewiews
Explore the hidden dangers of browser extensions, their security model limitations, and potential risks to user privacy. Learn about real-world analysis findings and discuss improved security measures.
Add to list
1
Lesons
45 minutes
On-Demand
Free-Video
OWASP Foundation
Firefox OS Security Model and Design Considerations
0
rewiews
Explore Firefox OS security model and design considerations with Mozilla's Security Assurance team lead. Learn about building a mobile OS using browser technologies.
Add to list
1
Lesons
1 hour
On-Demand
Free-Video
Linux Foundation
Building a WebAssembly-first OS - An Adventure Into the Unorthodox
0
rewiews
Explore the unconventional journey of creating a WebAssembly-first operating system, tackling unique challenges and reimagining fundamental OS concepts. Gain insights into innovative approaches to system architecture and security.
Add to list
1
Lesons
32 minutes
On-Demand
Free-Video
DEFCONConference
Fine-Grained Authorization with Relationship Based Access Control
0
rewiews
Explore fine-grained authorization through relationship-based access control (ReBAC), offering practical solutions for complex permission scenarios beyond traditional role-based systems.
Add to list
1
Lesons
29 minutes
On-Demand
Free-Video
TheIACR
Generic Authenticated Key Exchange in the Quantum Random Oracle Model
0
rewiews
Explores authenticated key exchange in quantum settings, addressing limitations of prior work and proposing a new security model for 2-move protocols in the Quantum Random Oracle Model.
Add to list
18
Lesons
32 minutes
On-Demand
Free-Video
TheIACR
Quantum Algorithms
0
rewiews
Explore quantum algorithms for lattice-based cryptography, focusing on speedups, security models, and practical implications for cryptographic systems.
Add to list
18
Lesons
1 hour 1 minute
On-Demand
Free-Video
TheIACR
Public Key Cryptography I
0
rewiews
Explore public key cryptography fundamentals, including motivation, system patterns, intuition, construction, security models, and noncommitting encryption techniques.
Add to list
12
Lesons
42 minutes
On-Demand
Free-Video
IEEE
OHIE - Blockchain Scaling Made Simple
0
rewiews
OHIE: A simple, scalable blockchain protocol that achieves high throughput by running parallel instances of Bitcoin's backbone, offering improved decentralization and linear scaling with available bandwidth.
Add to list
13
Lesons
17 minutes
On-Demand
Free-Video
TheIACR
Idealized Models in Cryptography - Session at Crypto 2022
0
rewiews
Explore cutting-edge cryptographic concepts and idealized models in this advanced session from Crypto 2022, featuring expert discussions on theoretical frameworks.
Add to list
1
Lesons
1 hour 21 minutes
On-Demand
Free-Video
ACM SIGPLAN
Proving Capability Safety in the Presence of Indirect Sentries
0
rewiews
Explore capability safety proofs with indirect sentries, advancing understanding of secure programming models and language design.
Add to list
1
Lesons
17 minutes
On-Demand
Free-Video
Hack In The Box Security Conference
From a Workplace to a Workforce
0
rewiews
Exploring pandemic-driven shifts in workplace security, this talk presents a model for protecting distributed workforce data and reducing organizational risk through adaptive access control.
Add to list
12
Lesons
52 minutes
On-Demand
Free-Video
DefCamp
Web Application Firewall Bypassing - DefCamp - 2016
0
rewiews
Aprende técnicas avanzadas para evadir firewalls de aplicaciones web, incluyendo métodos de reconocimiento, explotación de discrepancias y bypass de reglas para pruebas de penetración efectivas.
Add to list
13
Lesons
48 minutes
On-Demand
Free-Video
Security BSides San Francisco
BeyondCorp - Beyond "Fortress" Security
0
rewiews
BeyondCorp: A new security model that grants access based on device and user credentials, eliminating the need for traditional VPNs and enabling secure work from any network.
Add to list
19
Lesons
29 minutes
On-Demand
Free-Video
Black Hat
An Inconvenient Trust - User Attitudes Toward Security and Usability Tradeoffs
0
rewiews
Exploring user perspectives on encryption methods, balancing security and usability in digital communications. Insights from a study on key-exchange vs. key-directory models for everyday messaging.
Add to list
1
Lesons
28 minutes
On-Demand
Free-Video
44CON Information Security Conference
The Internet of Us
0
rewiews
Explore the evolving landscape of IoT security, challenging industry norms and emphasizing the need for new approaches to protect businesses and consumers in the interconnected world.
Add to list
17
Lesons
47 minutes
On-Demand
Free-Video
IEEE
Multiple Handshakes Security of TLS 1.3 Candidates
0
rewiews
Explores security aspects of TLS 1.3 candidates, focusing on multiple handshake protocols. Introduces a multi-level security model and proves the soundness of TLS 1.3 security design.
Add to list
1
Lesons
21 minutes
On-Demand
Free-Video
Black Hat
It Just -Net-works - The Truth About iOS 7's Multipeer Connectivity Framework
0
rewiews
Explore iOS 7's Multipeer Connectivity Framework: network-level analysis, security model, threats, and real-world app implementation. Gain insights into peer-to-peer communication on iOS devices.
Add to list
11
Lesons
30 minutes
On-Demand
Free-Video
Keynote - The Declarative Future
0
rewiews
Explore the future of cybersecurity with insights on containerization, declarative systems, and the psychology of app development. Learn about emerging trends and strategies for a more secure digital landscape.
Add to list
24
Lesons
43 minutes
On-Demand
Free-Video
TheIACR
Property Preserving Symmetric Encryption
0
rewiews
Explore property preserving symmetric encryption, its security definitions, and constructions using pairings in composite order groups. Learn about new directions in this cryptographic field.
Add to list
17
Lesons
27 minutes
On-Demand
Free-Video
TheIACR
Unconditionally Secure Computation with Reduced Interaction
0
rewiews
Explore unconditionally secure computation techniques, focusing on reduced interaction and improved efficiency for complex functions in cryptographic protocols.
Add to list
11
Lesons
21 minutes
On-Demand
Free-Video
TheIACR
Network Oblivious Transfer
0
rewiews
Explore network oblivious transfer protocols, including models, security aspects, and efficiency considerations in cryptographic applications.
Add to list
13
Lesons
21 minutes
On-Demand
Free-Video
TheIACR
An Efficient Pairing Based Shuffle Argument
0
rewiews
Explore efficient pairing-based shuffle arguments for e-voting, covering non-interactive arguments, security models, and implementation in bilinear groups.
Add to list
11
Lesons
23 minutes
On-Demand
Free-Video
TheIACR
Adaptively Secure ABE for DFA from k-Lin and More
0
rewiews
Explore advanced cryptographic techniques for Attribute-Based Encryption, focusing on Deterministic Finite Automata and k-Linear assumptions in this research presentation.
Add to list
6
Lesons
22 minutes
On-Demand
Free-Video
TheIACR
Privacy-Preserving Authenticated Key Exchange and the Case of IKEv2
0
rewiews
Explore privacy-preserving authenticated key exchange, focusing on IKEv2. Learn about security models, attack capabilities, and applications in IPsec with signature-based authentication.
Add to list
15
Lesons
23 minutes
On-Demand
Free-Video
TheIACR
Multiparty Computation 3
0
rewiews
Explore advanced concepts in multiparty computation, focusing on secure protocols and distributed algorithms for collaborative data analysis without compromising privacy.
Add to list
1
Lesons
51 minutes
On-Demand
Free-Video
linux.conf.au
The Delightful User Experience of Security
0
rewiews
Exploring how computer security can enhance usability, create user-friendly models, and maintain a positive experience while addressing new challenges in software development.
Add to list
1
Lesons
41 minutes
On-Demand
Free-Video
TheIACR
Security Models in Cryptography - AC 2023 Session
0
rewiews
Explore cutting-edge security models and their applications in cryptography during this in-depth session from the IACR's Annual Conference.
Add to list
1
Lesons
1 hour 20 minutes
On-Demand
Free-Video
load more...