Search for tag: "secure"

How do we know what we know? -- as a mathematical question. Designing knowledge assumptions and asymmetric encryption schemes in lattice-based cryptography., Yuxi Zheng, UG '23 (2279885)

Assumptions of various hard problems are essential in modern cryptography. There is a group of assumptions known as the “knowledge assumptions.” They assume that in order for the…

From  Research Princeton Research Day 4 likes 80 plays

Secure Research at Princeton: Social Sciences

This presentation guides the researcher through various data use agreement requirements, including testing, approval, and storage/analysis; provides tips on managing secure data, and discusses…

From  Irene Kopaliani 1 likes 41 plays

Citadel - Requesting Access or Support via ServiceNow

Step-by-step guide on requesting Access or Support via ServiceNow for Citadel

From  Irene Kopaliani 0 likes 15 plays

ServiceNow Primer for Citadel Sub-Admins

Overview of ServiceNow functionality including details on processing Citadel's Account Creation form. This training is to help sub-admins navigate the workflow in ServiceNow. Additional…

From  Irene Kopaliani 0 likes 9 plays

Citadel End User Training

End-User Citadel Training Live zoom session recording from January 7, 2021

From  Irene Kopaliani 0 likes 37 plays

CUI Overview

Overview of CUI Compliance Requirements

From  Irene Kopaliani 0 likes 19 plays