Search for tag: "encryption"

CITP_Distinguished_Lecture_with_Thomas_Ristenpart - Mitigating Technology Abuse in Intimate Partner Violence and Encrypted Messaging

Computer security is traditionally about the protection of technology, whereas trust and safety efforts focus on preventing technology abuse from harming people. In this talk, we’ll explore the…

From  CI Center for Information Technology Policy 0 likes 2 plays

How do we know what we know? -- as a mathematical question. Designing knowledge assumptions and asymmetric encryption schemes in lattice-based cryptography., Yuxi Zheng, UG '23 (2279885)

Assumptions of various hard problems are essential in modern cryptography. There is a group of assumptions known as the “knowledge assumptions.” They assume that in order for the…

From  Research Princeton Research Day 4 likes 80 plays

(Episode 8) Sending Files Securely

Check out this 6-minute video about sending files securely at Princeton and at home. For a deeper dive into this topic, please check out our webinar: Sending Files Securely.

From  Stefanie Clerkin 0 likes 33 plays

Sending Files Securely

(InfoSec 201) You’ve been asked to send personal information to your lawyer’s office, doctor’s office, or another trusted organization. Do you ever get confused about the proper way…

From  Stefanie Clerkin 0 likes 50 plays

CITP Seminar: Lucy Qin - A Decentralized and Encrypted National Gun Registry

Gun violence results in a significant number of deaths in the United States. Starting in the 1960’s, the US Congress passed a series of gun control laws to regulate the sale and use of…

From  CI Center for Information Technology Policy 0 likes 8 plays

Exploring Privacy Apps

(InfoSec 101) In celebration of International Data Privacy Day (January 28) and in collaboration with the Center for Digital Humanities’ Privacy Initiative, the Information Security Office will…

From  Stefanie Clerkin 0 likes 39 plays

Citadel End User Training

End-User Citadel Training Live zoom session recording from January 7, 2021

From  Irene Kopaliani 0 likes 37 plays

Now That We Know: Law, Technology, Journalism, and Policy After Snowden -- Determining the Role of Technology (Panel 1 of 3)

Now That We Know: Law, Technology, Journalism, and Policy After Snowden -- Determining the Role of Technology Panel 1 of 3 May 2nd, 2015 Princeton University

From  Jennifer Bolton 0 likes 27 plays

Edward Snowden Event (Part I)

Edward Snowden Event (Part I) May 2, 2015 Princeton University

From  Jennifer Bolton 0 likes 16 plays