YoVDO

Data Security Courses

The Challenges of Detecting Silent Exits of Your Data
Kaspersky via YouTube
Spiral- Fast, High-Rate Single-Server PIR via FHE Composition
IEEE via YouTube
Redactable Blockchain in the Permissionless Setting
IEEE via YouTube
Multi-Server Verifiable Computation of Low-Degree Polynomials
IEEE via YouTube
Wolverine - Fast, Scalable, and Communication-Efficient Zero-Knowledge Proofs for Boolean and Arithmetic Circuits
IEEE via YouTube
Network-Based LUKS Volume Decryption with Tang
USENIX via YouTube
Ghostor - Toward a Secure Data Sharing System from Decentralized Trust
USENIX via YouTube
Operating Elasticsearch with Ease at Scale
USENIX via YouTube
Riverbed - Enforcing User-defined Privacy Constraints in Distributed Web Services
USENIX via YouTube
Privid - Practical, Privacy-Preserving Video Analytics Queries
USENIX via YouTube
< Prev Page 38 Next >