Search for tag: "encryption"

CITP_Distinguished_Lecture_with_Thomas_Ristenpart - Mitigating Technology Abuse in Intimate Partner Violence and Encrypted Messaging

Computer security is traditionally about the…

+19 More
From  CI Center for Information Technology Policy May 5th, 2023 0 likes 2 plays

How do we know what we know? -- as a mathematical question. Designing knowledge assumptions and asymmetric encryption schemes in lattice-based cryptography., Yuxi Zheng, UG '23 (2279885)

Assumptions of various hard problems are…

+28 More
From  Research Princeton Research Day May 4th, 2023 4 likes 89 plays

(Episode 8) Sending Files Securely

Check out this 6-minute video about sending files…

From  Stefanie Clerkin June 7th, 2022 0 likes 75 plays

Sending Files Securely

(InfoSec 201) You’ve been asked to send…

From  Stefanie Clerkin May 16th, 2022 0 likes 65 plays

CITP Seminar: Lucy Qin - A Decentralized and Encrypted National Gun Registry

Gun violence results in a significant number of…

+22 More
From  CI Center for Information Technology Policy October 6th, 2021 0 likes 8 plays

Exploring Privacy Apps

(InfoSec 101) In celebration of International…

From  Stefanie Clerkin January 29th, 2021 0 likes 39 plays

Citadel End User Training

End-User Citadel Training Live zoom session…

From  Irene Kopaliani January 8th, 2021 0 likes 40 plays

Now That We Know: Law, Technology, Journalism, and Policy After Snowden -- Determining the Role of Technology (Panel 1 of 3)

Now That We Know: Law, Technology, Journalism,…

From  Jennifer Bolton May 6th, 2015 0 likes 27 plays

Edward Snowden Event (Part I)

Edward Snowden Event (Part I) May 2,…

From  Jennifer Bolton May 5th, 2015 0 likes 16 plays