YoVDO

Data Is a Stream - Security of Stream Based Channels

Offered By: TheIACR via YouTube

Tags

Conference Talks Courses Cryptography Courses Network Protocols Courses Data Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the security implications of stream-based channels in this 22-minute conference talk. Delve into SSH recovery attacks, cookie cutter attacks, and the intricacies of stream-based protocols. Examine security confidentiality, fragmented encryption, and their relationships. Gain insights into generic constructions and draw valuable conclusions about data stream security.

Syllabus

Intro
SSH Recovery Attack
Cookie Cutter Attack
Stream Based Protocols
Security Confidentiality
Fragmented Encryption
Relations
Generic Construction
Conclusion


Taught by

TheIACR

Related Courses

Building Geospatial Apps on Postgres, PostGIS, & Citus at Large Scale
Microsoft via YouTube
Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube
Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube
What's New in Grails 2.0
ChariotSolutions via YouTube
Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube