Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Web Development
Software Development
Graphic Design
Functional Programming Principles in Scala
Mountains 101
Industrial Pharmacy-I
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore inference attacks on searchable encryption, focusing on Bloom filters and graph matching techniques to compromise data confidentiality in encrypted databases.
Comprehensive formal security analysis of OAuth 2.0, examining authorization, authentication, and session integrity properties, and discussing potential attacks and mitigations.
Explore secure stable matching algorithms for large-scale applications, focusing on privacy preservation and efficient computation in scenarios like medical residency matching.
Explore unilateral-to-mutual authentication in key exchange, focusing on client authentication in TLS 1.3. Learn about the SIGMAC compiler, security definitions, and post-handshake protocols.
Explore practical non-malleable codes using I-more extractable hash functions, covering security, error correction, and applications in cryptography and data integrity.
Presentation on Σoφoς, a forward secure searchable encryption scheme, discussing its design, security properties, and performance evaluation in comparison to existing solutions.
Explore new constructions, applications, and lower bounds of Order-Revealing Encryption, focusing on encrypted data searching and range queries with enhanced security and performance.
Explore partial order preserving encoding for secure data management, covering introduction, space analysis, security considerations, and addressing audience questions.
Explore automated feature engineering for malware detection using security literature mining, enhancing detection accuracy and providing explainable results.
Innovative phoneme localization technique for voice authentication on smartphones, enhancing security against spoofing attacks through advanced speech analysis and microphone array technology.
Explore black-box enforcement of Content Security Policy on websites, covering deployment, training, rewriting, and evaluation of CSPAutoGen for enhanced web security.
Explore HTTPS ecosystem's private key sharing practices, risks, and implications for web security. Learn detection methods and analysis of key sharing among domains and hosting providers.
Explore techniques to mitigate side-channel attacks in last-level caches, focusing on Copy-On-Access and Cacheability Management methods for enhanced cloud security.
Explore power side-channel analysis for code execution tracking in embedded systems, covering key extraction attacks, control flow integrity, and Hidden Markov Models for security applications.
Explore covert channels in random number generators, their mechanisms, capacity estimation, and mitigation strategies for enhanced computer security.
Get personalized course recommendations, track subjects and courses with reminders, and more.