Data Is a Stream - Security of Stream Based Channels
Offered By: TheIACR via YouTube
Course Description
Overview
Explore the security implications of stream-based channels in this 22-minute conference talk. Delve into SSH recovery attacks, cookie cutter attacks, and the intricacies of stream-based protocols. Examine security confidentiality, fragmented encryption, and their relationships. Gain insights into generic constructions and draw valuable conclusions about data stream security.
Syllabus
Intro
SSH Recovery Attack
Cookie Cutter Attack
Stream Based Protocols
Security Confidentiality
Fragmented Encryption
Relations
Generic Construction
Conclusion
Taught by
TheIACR
Related Courses
Managing Devices using Enterprise Mobility SuiteMicrosoft via edX Firebase Essentials For Android
Google via Udacity Research Data Management and Sharing
The University of North Carolina at Chapel Hill via Coursera SAP HANA CLOUD PLATFORM の重要事項
SAP Learning Windows 10 pour l'entreprise
Microsoft Virtual Academy via OpenClassrooms