Search for tag: "secure"
How do we know what we know? -- as a mathematical question. Designing knowledge assumptions and asymmetric encryption schemes in lattice-based cryptography., Yuxi Zheng, UG '23 (2279885)Assumptions of various hard problems are essential in modern cryptography. There is a group of assumptions known as the “knowledge assumptions.” They assume that in order for the…
From Research Princeton Research Day
4 likes
89 plays
|
|
Secure Research at Princeton: Social SciencesThis presentation guides the researcher through various data use agreement requirements, including testing, approval, and storage/analysis; provides tips on managing secure data, and discusses…
From Irene Kopaliani
1 likes
54 plays
|
|
Citadel - Requesting Access or Support via ServiceNowStep-by-step guide on requesting Access or Support via ServiceNow for Citadel
From Irene Kopaliani
0 likes
18 plays
|
|
ServiceNow Primer for Citadel Sub-AdminsOverview of ServiceNow functionality including details on processing Citadel's Account Creation form. This training is to help sub-admins navigate the workflow in ServiceNow. Additional…
From Irene Kopaliani
0 likes
14 plays
|
|
Citadel End User TrainingEnd-User Citadel Training Live zoom session recording from January 7, 2021
From Irene Kopaliani
0 likes
39 plays
|
|