Search for tag: "security"
How do we know what we know? -- as a mathematical question. Designing knowledge assumptions and asymmetric encryption schemes in lattice-based cryptography., Yuxi Zheng, UG '23 (2279885)Assumptions of various hard problems are…
From Research Princeton Research Day
May 4th, 2023
4 likes
89 plays
|
|
Creating your Personal Risk Management Plan - Webinar(InfoSec 201) Organizations look at their…
From Stefanie Clerkin
February 23rd, 2023
0 likes
53 plays
|
|
10 Back to School Cybersecurity Safety TipsCheck out this 5-minute video about 10 back to…
From Stefanie Clerkin
August 8th, 2022
2 likes
239 plays
|
|
Quick Tip: MFA Fatigue AttacksThis series of short videos answers frequently…
From Stefanie Clerkin
June 27th, 2022
3 likes
533 plays
|
|
(Episode 8) Sending Files SecurelyCheck out this 6-minute video about sending files…
From Stefanie Clerkin
June 7th, 2022
0 likes
75 plays
|
|
Quick Tip: The Hidden Risks of QR CodesThis series of short videos answers frequently…
From Stefanie Clerkin
March 16th, 2022
2 likes
157 plays
|
|
Wintersession - Information Security in the NewsAs we enter 2022, we look back at the state of…
From Stefanie Clerkin
January 18th, 2022
0 likes
14 plays
|