By: Prof. Harry R. Lewis, Ph.D,
Gordon McKay Professor of Computer Science, Harvard University.
Surveillance
- Video
- Guest Chris Soghoian
- Tracking and monitoring: RFID cards
- Surveillance and national security
- Tracking and monitoring: device
- Introduction: history of encryption
- Encryption: history as a military technology; legislative attempts to control encryption keys
- How to decrypt a cipher, an example of a substitution cipher
- Cryptosystems
- Vigenere's cipher, frequency analysis
- Secure encryption: an introduction
- Public Key Cryptography: Diffie-Hellman key agreement and
- Public Key Cryptography and computing big powers
- Diffie-Hellman Key Agreement
- Additional thoughts re: cryptography
Enroll in Harvard Extension School courses
If you enjoyed this free class, the Harvard Extension School offers a
wide variety of courses in numerous fields. Search for classes and enroll for credit
during the fall and spring registration periods.
Sumber Foto:
Arip Nurahman: SMA Budi Luhur
Sumber Foto:
Arip Nurahman: SMA Budi Luhur
Tidak ada komentar:
Posting Komentar