Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Psychology
Microsoft Excel
Lean Production
Viruses & How to Beat Them: Cells, Immunity, Vaccines
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore physical side-channel attacks on ECDSA key extraction from mobile devices, covering analysis methods, results, equipment, and potential countermeasures.
Explore inference attacks on searchable encryption, focusing on Bloom filters and graph matching techniques to compromise data confidentiality in encrypted databases.
Comprehensive formal security analysis of OAuth 2.0, examining authorization, authentication, and session integrity properties, and discussing potential attacks and mitigations.
Explore secure stable matching algorithms for large-scale applications, focusing on privacy preservation and efficient computation in scenarios like medical residency matching.
Explore unilateral-to-mutual authentication in key exchange, focusing on client authentication in TLS 1.3. Learn about the SIGMAC compiler, security definitions, and post-handshake protocols.
Explore practical non-malleable codes using I-more extractable hash functions, covering security, error correction, and applications in cryptography and data integrity.
Presentation on Σoφoς, a forward secure searchable encryption scheme, discussing its design, security properties, and performance evaluation in comparison to existing solutions.
Explore new constructions, applications, and lower bounds of Order-Revealing Encryption, focusing on encrypted data searching and range queries with enhanced security and performance.
Explore partial order preserving encoding for secure data management, covering introduction, space analysis, security considerations, and addressing audience questions.
Explore automated feature engineering for malware detection using security literature mining, enhancing detection accuracy and providing explainable results.
Innovative phoneme localization technique for voice authentication on smartphones, enhancing security against spoofing attacks through advanced speech analysis and microphone array technology.
Explore black-box enforcement of Content Security Policy on websites, covering deployment, training, rewriting, and evaluation of CSPAutoGen for enhanced web security.
Explore HTTPS ecosystem's private key sharing practices, risks, and implications for web security. Learn detection methods and analysis of key sharing among domains and hosting providers.
Explore techniques to mitigate side-channel attacks in last-level caches, focusing on Copy-On-Access and Cacheability Management methods for enhanced cloud security.
Explore power side-channel analysis for code execution tracking in embedded systems, covering key extraction attacks, control flow integrity, and Hidden Markov Models for security applications.
Get personalized course recommendations, track subjects and courses with reminders, and more.