MIT Sloan: Lead AI Adoption Across Your Organization — Not Just Pilot It
Master Windows Internals - Kernel Programming, Debugging & Architecture
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore the intersection of cryptography and cloud computing in this 47-minute conference talk. Delve into topics such as searchable encryption, systemwide security, and the Swiss Army knife of cryptography. Gain insights into JSON Web Tokens (JWT), including their functionality and potential vulnerabilities. Examine cloud storage systems, key metadata, and the process of vulnerability discovery. Learn about the various components that contribute to secure cloud infrastructure and the challenges faced in maintaining data privacy and integrity in cloud environments.
Syllabus
Introduction
Searchable Encryption
Systemwide Security
Swissa
Summary
JWT
How JWT works
Weaknesses
All Keys
Pieces
Questions
Vulnerability discovery
Key metadata
Cloud storage systems
Taught by
TheIACR