Search for tag: "encryption"
CITP_Distinguished_Lecture_with_Thomas_Ristenpart - Mitigating Technology Abuse in Intimate Partner Violence and Encrypted MessagingComputer security is traditionally about the protection of technology, whereas trust and safety efforts focus on preventing technology abuse from harming people. In this talk, we’ll explore the…
From CI Center for Information Technology Policy
0 likes
2 plays
|
|
How do we know what we know? -- as a mathematical question. Designing knowledge assumptions and asymmetric encryption schemes in lattice-based cryptography., Yuxi Zheng, UG '23 (2279885)Assumptions of various hard problems are essential in modern cryptography. There is a group of assumptions known as the “knowledge assumptions.” They assume that in order for the…
From Research Princeton Research Day
4 likes
87 plays
|
|
(Episode 8) Sending Files SecurelyCheck out this 6-minute video about sending files securely at Princeton and at home. For a deeper dive into this topic, please check out our webinar: Sending Files Securely.
From Stefanie Clerkin
0 likes
39 plays
|
|
Sending Files Securely(InfoSec 201) You’ve been asked to send personal information to your lawyer’s office, doctor’s office, or another trusted organization. Do you ever get confused about the proper way…
From Stefanie Clerkin
0 likes
51 plays
|
|
CITP Seminar: Lucy Qin - A Decentralized and Encrypted National Gun RegistryGun violence results in a significant number of deaths in the United States. Starting in the 1960’s, the US Congress passed a series of gun control laws to regulate the sale and use of…
From CI Center for Information Technology Policy
0 likes
8 plays
|
|
Exploring Privacy Apps(InfoSec 101) In celebration of International Data Privacy Day (January 28) and in collaboration with the Center for Digital Humanities’ Privacy Initiative, the Information Security Office will…
From Stefanie Clerkin
0 likes
39 plays
|
|
Citadel End User TrainingEnd-User Citadel Training Live zoom session recording from January 7, 2021
From Irene Kopaliani
0 likes
39 plays
|
|
Now That We Know: Law, Technology, Journalism, and Policy After Snowden -- Determining the Role of Technology (Panel 1 of 3)Now That We Know: Law, Technology, Journalism, and Policy After Snowden -- Determining the Role of Technology Panel 1 of 3 May 2nd, 2015 Princeton University
From Jennifer Bolton
0 likes
27 plays
|
|
Edward Snowden Event (Part I)Edward Snowden Event (Part I) May 2, 2015 Princeton University
From Jennifer Bolton
0 likes
16 plays
|