Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Graphic Design
Computer Science
Cybersecurity
Max MSP Programming Course: Structuring Interactive Software for Digital Arts
Fundamentals of Neuroscience, Part 1: The Electrical Properties of the Neuron
Psychology of Personal Growth
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore the provable security of (EC)DSA signatures, examining theoretical foundations and practical implications for cryptographic systems.
Explore constant-time DSA signing exponentiations for enhanced cryptographic security. Insights from experts on mitigating timing attacks in digital signature algorithms.
Explores generic attacks on secure outsourced databases, revealing vulnerabilities in data protection methods and proposing potential countermeasures for enhanced security in cloud storage systems.
Explore systematic fuzzing and testing techniques for TLS libraries, enhancing security in cryptographic protocols and network communications.
Explore innovative cryptographic techniques for enhancing password security through partially oblivious commitments, presented by experts in computer and communications security.
Explore high-throughput secure three-party computation with an honest majority in this presentation on advanced cryptographic protocols and their practical applications.
Explore ARM-based side-channel attacks using Return-Oriented Flush-Reload techniques and their potential impact on Android device security.
Explore SANA, a secure and scalable network attestation system, presented at CCS 2016. Learn about its design, efficiency, and security considerations for protecting large-scale networks.
Explores security and usability of segment-based visual cryptographic authentication, analyzing protocols for effectiveness in balancing protection and user experience.
Explore a non-interactive receipt-free electronic voting scheme, BeleniosRF, enhancing election integrity and voter privacy through advanced cryptographic techniques.
Explore identity-concealed authenticated encryption and key exchange techniques, enhancing privacy and security in cryptographic protocols for modern communication systems.
Explore attribute-based key exchange with general policies, presented by experts from Bell Labs, IBM Research, Bar-Ilan University, and Galios at the 23rd ACM Conference on Computer and Communications Security.
Explores implications of order-revealing encryption, discussing potential security vulnerabilities and unintended information leakage in cryptographic systems.
Explore how error handling in in-vehicle networks creates vulnerabilities, focusing on security implications for automotive systems and potential countermeasures.
Explore deterministic Rowhammer attacks on mobile platforms, uncovering vulnerabilities in modern devices and discussing potential security implications for mobile computing.
Get personalized course recommendations, track subjects and courses with reminders, and more.