Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Psychology
Microsoft Excel
Lean Production
Viruses & How to Beat Them: Cells, Immunity, Vaccines
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explores security vulnerabilities in ambient audio-based two-factor authentication, demonstrating potential attacks and discussing mitigation strategies for improved cybersecurity.
Explore automatic discovery and analysis of open-source cyber threat intelligence, focusing on IOC generation, correlation analysis, and impact on security.
Explore automated workflow-based exploit generation for web applications using Chainsaw, a novel approach to identify and exploit vulnerabilities through informed traversal and workflow inference.
Learn statistical test generation techniques for detecting hardware Trojans through side-channel analysis, focusing on rare nodes and security metrics in combinational circuits.
Explore practical security vulnerabilities in 64-bit block ciphers, focusing on collision attacks in HTTP over TLS and OpenVPN. Learn about countermeasures and implications for network security.
Explore message-recovery attacks on Feistel-based format preserving encryption, examining technical challenges, known plaintext attacks, and theoretical implications for cryptographic security.
Explore local differential privacy for heavy hitter estimation on set-valued data. Learn about randomized response, RAPPOR, and the LDPMiner framework for privacy-preserving data analysis.
Innovative approach to locating memory corruption vulnerabilities using core dumps, tracking crash points, identifying stack frames, and determining corruption sources for improved software security.
Systematic analysis of Juniper's Dual EC cryptographic incident, exploring vulnerabilities, attack methods, and implications for network security and encryption standards.
Explore advanced probabilistic couplings for differential privacy, covering composition theorems, program logic, and accuracy-dependent privacy in this in-depth technical presentation.
Explore MPC-friendly symmetric key primitives for secure computation, focusing on PRFs, secure sharing, and efficient preprocessing techniques in cryptography.
Explore authenticated data feeds for smart contracts using Town Crier, leveraging Intel SGX for secure and confidential data delivery in decentralized environments.
Explore Bitcoin's stability without block rewards, examining key results, mining strategies, and potential future challenges in cryptocurrency economics.
Secure sharding protocol for open blockchains addressing scalability issues. Introduces Elastico, a novel solution using directory committees and epoch randomness for improved performance and security.
Explore asynchronous Byzantine fault tolerance protocols, focusing on Honey Badger's resilience, optimal performance, and practical applications in wide area networks.
Get personalized course recommendations, track subjects and courses with reminders, and more.