Cryptography

Information leakage

Information leakage happens whenever a system that is designed to be closed to an eavesdropper reveals some information to unauthorized parties nonetheless. In other words: Information leakage occurs when secret information correlates with, or can be correlated with, observable information. For example, when designing an encrypted instant messaging network, a network engineer without the capacity to crack encryption codes could see when messages are transmitted, even if he could not read them. (Wikipedia).

Video thumbnail

TLS Information Leak - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Shmoocon 2010: Information disclosure via P2P networks 1/3

Full title: Information disclosure via P2P networks: Why stealing an identity via Gnutella is like clubbing baby seals. Clip 1/3 Speakers: Larry Pesce and Mick Douglas In recent news stories. we've been presented with the arrests of several individuals whom have been arrested for st

From playlist ShmooCon 2010

Video thumbnail

Shmoocon 2010: Information disclosure via P2P networks 3/3

Full title: Information disclosure via P2P networks: Why stealing an identity via Gnutella is like clubbing baby seals. Clip 3/3 Speakers: Larry Pesce and Mick Douglas In recent news stories. we've been presented with the arrests of several individuals whom have been arrested for st

From playlist ShmooCon 2010

Video thumbnail

Shmoocon 2010: Information disclosure via P2P networks 2/3

Full title: Information disclosure via P2P networks: Why stealing an identity via Gnutella is like clubbing baby seals. Clip 2/3 Speakers: Larry Pesce and Mick Douglas In recent news stories. we've been presented with the arrests of several individuals whom have been arrested for st

From playlist ShmooCon 2010

Video thumbnail

What was Equifax Breach and why privacy matters

Once your private information is out there it’s going to stay there forever. There is no “delete” button for the Internet. Especially for the darknet side of it. Your data will be floating around before it gets to the hands of the right people to make you become a victim of a major cyber c

From playlist The state of surveillance

Video thumbnail

CERIAS Security: An Analysis of Data Breach Disclosure 6/6

Clip 6/6 Speaker: Melissa Dark · Purdue University In the past six years, 44 states in the United States have embraced a new form of privacy and identity theft regulation mandatory disclosure of data breach information. Information disclosure regulation is a form of legislation consider

From playlist The CERIAS Security Seminars 2009

Video thumbnail

CERIAS Security: An Analysis of Data Breach Disclosure 4/6

Clip 4/6 Speaker: Melissa Dark · Purdue University In the past six years, 44 states in the United States have embraced a new form of privacy and identity theft regulation mandatory disclosure of data breach information. Information disclosure regulation is a form of legislation consider

From playlist The CERIAS Security Seminars 2009

Video thumbnail

Privacy Matters

http://privacymatters.nl/

From playlist awareness

Video thumbnail

(IC 1.6) A different notion of "information"

An informal discussion of the distinctions between our everyday usage of the word "information" and the information-theoretic notion of "information". A playlist of these videos is available at: http://www.youtube.com/playlist?list=PLE125425EC837021F Attribution for image of TV static:

From playlist Information theory and Coding

Video thumbnail

nexus Trimester - Aaron Wagner (Cornell)

An Operational Measure of Information Leakage Aaron Wagner (Cornell) March 01, 2016 Abstract: Given two random variables [Math Processing Error] and [Math Processing Error], a new measure [Math Processing Error], called emph{G-leakage}, is proposed to quantify the amount of information th

From playlist Nexus Trimester - 2016 - Central Workshop

Video thumbnail

DSI | Leakage and the Reproducibility Crisis in ML-based Science

The use of machine learning (ML) methods for prediction and forecasting has become widespread across the quantitative sciences. However, there are many known methodological pitfalls, including data leakage, in ML-based science. In this talk, I will present results from our investigation of

From playlist DSI Virtual Seminar Series

Video thumbnail

Data leakage during data preparation? | Using AntiPatterns to avoid MLOps Mistakes

How can data leakage happen during data preparation? Find out here, where Ms. Coffee Bean is visualizing the answer to this question -- as it was answered by the paper “Using AntiPatterns to avoid MLOps Mistakes”. Paper explained 📄: Muralidhar, Nikhil, Sathappah Muthiah, Patrick Butler, M

From playlist Explained AI/ML in your Coffee Break

Video thumbnail

Everyone Leaks (and why that's a good thing) | by Michael Kim | Kaggle Days SF

Michael Kim "Everyone Leaks (and why that's a good thing)" Kaggle Days San Francisco held in April 2019 gathered over 300 participants to meet, learn and code with Kaggle Grandmasters, and compete in our traditional offline competition. This edition is presented by LogicAI with sponsors

From playlist Kaggle Days San Francisco Edition | by LogicAI + Kaggle

Video thumbnail

NOTACON 5: Data Loss Protection - Hope or Hype?

Speakers: Enno Rey and Angus Blitter To lose control over one's own data is one of the primal fears of the digital age. More than ever this applies in particular to the world of corporations and organizations with all their trade secrets and peachy marketing plans to be protected from lea

From playlist Notacon 5

Video thumbnail

Stanford Seminar - Adaptable Robotic Manipulation Using Tactile Sensors

Tae Myung Huh of UC Santa Cruz October 28, 2022 Despite some successful demonstrations, bringing robots into our everyday lives still remains a challenge. One of the major hurdles is the sensing of contact conditions. Contact conditions profoundly affect how the robot’s actions will affec

From playlist Stanford AA289 - Robotics and Autonomous Systems Seminar

Video thumbnail

Practical Defenses Against Adversarial Machine Learning

Adversarial machine learning has hit the spotlight as a topic relevant to practically-minded security teams, but noise and hype have diluted the discourse to gradient-based comparisons of blueberry muffins and chihuahuas. This fails to reflect the attack landscape, making it difficult to a

From playlist Top 10 Tutorials and Talks: Adversarial Machine Learning

Video thumbnail

Lec 2 | MIT 22.091 Nuclear Reactor Safety, Spring 2008

Lecture 2: Reactor physics review Instructor: Andrew Kadak View the complete course: http://ocw.mit.edu/22-091S08 License: Creative Commons BY-NC-SA More information at http://ocw.mit.edu/terms More courses at http://ocw.mit.edu

From playlist MIT 22.091 Nuclear Reactor Safety, Spring 2008

Video thumbnail

SOURCE Barcelona 2010: Leveraging Social Networking While Mitigating Risk

Speaker: Nick Copeland, Fidelis Security Systems Historically, risk management decisions may have supported preventing the use of social media historically, and for certain organizations perhaps that may still be the case today. However, I believe that many organizations now have the abil

From playlist SOURCE Barcelona 2010

Video thumbnail

Nexus trimester - Allison Bishop (Columbia)

Interactive Coding for Intercative Proofs Allison Bishop (Columbia) February 08, 2016

From playlist Nexus Trimester - 2016 - Distributed Computation and Communication Theme

Video thumbnail

25c3: Wikileaks

Wikileaks vs. the World Wikileaks is developing an uncensorable Wikipedia for untraceable mass document leaking and analysis. In the past year, Wikileaks has publicly revealed more sensitive military documents than the entire world's press combined. Its mission has been quite successful a

From playlist 25C3: Nothing to hide

Related pages

Traffic analysis | Encryption | Subliminal channel | Steganography | Cryptographic nonce | Side-channel attack