Digital Signature

Sort options

Cryptographic Hash and Integrity Protection (Coursera)

This course reviews cryptographic hash functions in general and their use in the forms of hash chain and hash tree (Merkle tree). Building on hash functions, the course describes message authentication focusing on message authentication code (MAC) based on symmetric keys. We then discuss digital signatures based on asymmetric [...]

E-Payment (edX)

Self Paced
E-Payment (edX)
Course Auditing
Categories
Effort
Languages
Master the technologies behind e-payment systems and learn about their security mechanisms. Electronic payments have become an integral part of our daily lives. This in-depth course is designed to give students a thorough grasp of various e-payment systems, their underlying technology, and the security measures and regulations that ensure [...]

Big Data Science with the BD2K-LINCS Data Coordination and Integration Center (Coursera)

In this course we briefly introduce the DCIC and the various Centers that collect data for LINCS. We then cover metadata and how metadata is linked to ontologies. We then present data processing and normalization methods to clean and harmonize LINCS data. This follow discussions about how data is [...]

Unlocking Information Security II: An Internet Perspective (edX)

Continue learning how systems are hacked and defended. Information Security is everywhere: as the world becomes more and more digitized, so it becomes more and more hackable. Cyber attacks, data breaches, and even cyber warfare are all very real - so it's infinitely important to understand how hackers think [...]

Sicher per E-Mail kommunizieren - Mitleser unerwünscht (openHPI)

Jun 12th 2019
Sicher per E-Mail kommunizieren - Mitleser unerwünscht (openHPI)
Free Course
Categories
Effort
Languages
Die E-Mail ist eines der wichtigsten Kommunikationsmittel unserer Zeit. Dennoch lässt die Technologie hinsichtlich der Sicherheit deutlich zu wünschen übrig. E-Mail-Nutzer/innen können sich weder sicher sein, dass niemand die Nachrichten mitliest, noch dass diese auch unverändert bei den Empfänger/innen ankommen. Um geeignete Sicherheitsmaßnahmen - die sogenannte Ende-zu-Ende-Verschlüsselung sowie digitale [...]