Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Artificial Intelligence
OpenAI
Divide and Conquer, Sorting and Searching, and Randomized Algorithms
Introduction to Graphic Illustration
The Science of Gastronomy
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore privacy-preserving machine learning with ABY3, a framework addressing data collection concerns through encrypted computations and secure multi-party protocols.
Explores advanced non-interactive zero-knowledge proofs, enhancing efficiency and security for post-quantum signatures using MPC protocols in the preprocessing model.
DeepMem: A graph-based deep learning approach for fast and robust memory forensic analysis, using novel memory graph models and neural networks to enhance object detection in raw memory dumps.
Explore advanced cryptography beyond communication security, including zero knowledge and secure multi-party computation. Learn about its potential, performance, and current usability challenges.
Explore SDN control plane integrity attacks and cross-app poisoning, uncovering vulnerabilities in RBAC and evaluating their impact on network security.
Explore vulnerabilities in Network Management Datastore Architecture, focusing on SDN infrastructures. Learn about semantic gaps, fuzzing techniques, and mitigation strategies for DoS and misconfiguration attacks.
Explore efficient protocols for secure multiparty computation, focusing on fairness and guaranteed output delivery in 3-party and 4-party settings over the internet.
Introduces a simplified Markov-chain method for analyzing blockchain consistency, improving upon previous complex approaches and applicable to various Nakamoto protocol variations.
Analyze cryptocurrency security through the "gap game", exploring mining incentives, block creation, and centralization risks using symbolic and numeric analysis tools.
Explore Scission, an Intrusion Detection System for CAN bus security in vehicles. Learn about sender authentication, ECU fingerprinting, and protecting against adversarial attacks on vehicle functions.
Explore techniques for detecting cyber and physical attacks on robotic vehicles using control invariants, enhancing mission security and preventing disruptions.
Explore secure two-party protocols for vector oblivious linear evaluation, its applications, and improvements in pseudorandom correlations and sparse vector-OLE generation.
Explore RapidChain's innovative full sharding approach to overcome blockchain scalability limitations, enhancing performance and efficiency in decentralized networks.
Explore off-chain protocols and state channel networks as scalable solutions for cryptocurrencies, focusing on payment channels, smart contracts, and virtual state channels.
Explore advanced techniques for dynamic symmetric searchable encryption, focusing on forward and backward privacy to enhance data security in cloud environments.
Get personalized course recommendations, track subjects and courses with reminders, and more.