Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Artificial Intelligence
OpenAI
Divide and Conquer, Sorting and Searching, and Randomized Algorithms
Introduction to Graphic Illustration
The Science of Gastronomy
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore practical solutions for encrypted matrix operations in homomorphic encryption, including novel encoding methods and efficient evaluation strategies for basic matrix arithmetic and neural networks.
Explore efficient multiparty ECDSA signatures with fast, trustless setup. Learn about threshold schemes, communication optimization, and implementation details for secure digital signatures.
Explore system operators' views on security misconfigurations, their causes, and potential solutions in this insightful investigation of cybersecurity practices and incident prevention.
Explore automated integrity verification for web downloads, enhancing user security through improved checksum usability and implementation strategies.
Explores user experience challenges of Tor Browser, analyzing non-expert interactions to identify usability issues and improve adoption of anonymity systems. Insights for enhancing privacy-focused web browsing.
Explore secure stream-based channels, focusing on multiplexing data streams over a single channel. Learn about TLS 1.3 record layer, model evolution, and challenges in this technical deep dive.
Revisiting GCM's multi-user security with new concrete bounds, focusing on nonce re-use across users and re-keying impacts. Provides refined parameterization of adversarial resources for improved security analysis.
Explore control-flow integrity enhancement through unique code target property, addressing challenges in Intel PT implementation, security enforcement, and efficiency optimization.
Explore a novel hardware fingerprinting technique using instruction timing, applicable remotely via JavaScript. Learn about its generation, comparison, and evaluation phases.
Explore proactive cybersecurity through user behavior analysis, enabling real-time prediction and prevention of malicious content exposure during browsing sessions.
Explore real-time provenance-based auditing techniques for enhanced system security, overcoming limitations of post-hoc analysis in forensic investigations.
Innovative machine learning approach for predicting debug information in stripped binaries, enhancing analysis capabilities for security professionals and reverse engineers.
Explore privacy risks of browser extensions, uncovering information leakage through taint tracking and data flow analysis techniques.
Explore drive-by cryptocurrency mining, its prevalence, and defense strategies. Analyze cryptojacking threats, evasion techniques, and profit estimation in this comprehensive cybersecurity examination.
Explore memory hard functions, their applications in cybersecurity, and the metrics used to evaluate their effectiveness. Learn about ASIC advantages and strategies to mitigate them.
Get personalized course recommendations, track subjects and courses with reminders, and more.