Search Constraints
Number of results to display per page
Results for:
Keywords
Data encryption (Computer science)
Remove constraint Keywords: Data encryption (Computer science)
1 - 4 of 4
Search Results
-
Video
As quantum computing matures, it's going to bring unimaginable increases in computational power along with it -- and the systems we use to protect our data (and our democratic processes) will become even more vulnerable. But there's still time to plan against the impending data apocalypse, says encryption expert Vikram Sharma. Learn more about how he's fighting quantum with quantum: designing security devices and programs that use the power of quantum physics to defend against the most sophisticated attacks.
- Subjects:
- Electronic and Information Engineering, Physics, and Computing
- Keywords:
- Quantum computing Data encryption (Computer science)
- Resource Type:
- Video
-
Video
This video introduces basic terminology in cryptography, including what is a ciphertext, plaintext, keys, public key crypto, and private key crypto. This is a video shared via the picoCTF youtube channel. picoCTF is a platform organized by Carnegie Mellon University (“CMU”)
- Subjects:
- Computing
- Keywords:
- Cryptography Data encryption (Computer science)
- Resource Type:
- Video
-
Courseware
6.858 Computer Systems Security is a class about the design and implementation of secure computer systems. Lectures cover threat models, attacks that compromise security, and techniques for achieving security, based on recent research papers. Topics include operating system (OS) security, capabilities, information flow control, language security, network protocols, hardware security, and security in web applications.
- Subjects:
- Computing
- Keywords:
- Data protection Computer security Computer networks -- Security measures Data encryption (Computer science)
- Resource Type:
- Courseware
-
e-book
In the era of Internet of Things (IoT) and with the explosive worldwide growth of electronic data volume, and associated need of processing, analysis, and storage of such humongous volume of data, several new challenges are faced in protecting privacy of sensitive data and securing systems by designing novel schemes for secure authentication, integrity protection, encryption, and non-repudiation. Lightweight symmetric key cryptography and adaptive network security algorithms are in demand for mitigating these challenges. This book presents some of the state-of-the-art research work in the field of cryptography and security in computing and communications. It is a valuable source of knowledge for researchers, engineers, practitioners, graduates, and doctoral students who are working in the field of cryptography, network security, and security and privacy issues in the Internet of Things (IoT). It will also be useful for faculty members of graduate schools and universities.
- Subjects:
- Computing
- Keywords:
- Data protection Computer security Computer networks -- Security measures Data encryption (Computer science)
- Resource Type:
- e-book