Search for tag: "encryption"

CITP_Distinguished_Lecture_with_Thomas_Ristenpart - Mitigating Technology Abuse in Intimate Partner Violence and Encrypted Messaging

Computer security is traditionally about the…

+19 More
From  CI Center for Information Technology Policy 0 likes 2 plays

How do we know what we know? -- as a mathematical question. Designing knowledge assumptions and asymmetric encryption schemes in lattice-based cryptography., Yuxi Zheng, UG '23 (2279885)

Assumptions of various hard problems are…

+28 More
From  Research Princeton Research Day 4 likes 89 plays

(Episode 8) Sending Files Securely

Check out this 6-minute video about sending files…

From  Stefanie Clerkin 0 likes 72 plays

Sending Files Securely

(InfoSec 201) You’ve been asked to send…

From  Stefanie Clerkin 0 likes 61 plays

CITP Seminar: Lucy Qin - A Decentralized and Encrypted National Gun Registry

Gun violence results in a significant number of…

+22 More
From  CI Center for Information Technology Policy 0 likes 8 plays

Exploring Privacy Apps

(InfoSec 101) In celebration of International…

From  Stefanie Clerkin 0 likes 39 plays

Citadel End User Training

End-User Citadel Training Live zoom session…

From  Irene Kopaliani 0 likes 40 plays

Now That We Know: Law, Technology, Journalism, and Policy After Snowden -- Determining the Role of Technology (Panel 1 of 3)

Now That We Know: Law, Technology, Journalism,…

From  Jennifer Bolton 0 likes 27 plays

Edward Snowden Event (Part I)

Edward Snowden Event (Part I) May 2,…

From  Jennifer Bolton 0 likes 16 plays