Power BI Fundamentals - Create visualizations and dashboards from scratch
Save 43% on 1 Year of Coursera Plus
Overview
Coursera Spring Sale
40% Off Coursera Plus Annual!
Grab it
Explore the concept of deniable encryption in this 19-minute Black Hat conference talk. Delve into the main idea, motivation, and various applications of this technology. Learn about existing solutions, from simple to more sophisticated approaches, and understand the core technology behind set and string reconciliation. Examine an implementation example and gain insights into the potential impact of deniable encryption on digital privacy and security.
Syllabus
black hat
Why listen ... to me?
Main Idea
Motivation
Other applications
Our Solution
What's out there?
Simple solution
Smarter solutions
Core Technology
Core Tech - Set Reconciliation
Core Tech - String Reconciliation
Implementation - Example
Conclusion
References
Taught by
Black Hat