Location>code7788 >text

Selected range of topics for the Big Four

Popularity:660 ℃/2024-10-07 16:11:00
  • Cybersecurity
    • Security Architecture and Design (SAD)
    • Vulnerability Detection and Exploitation (VDE)
    • Network Attacks and Defense (NAD)
  • Cryptography
    • Zero-Knowledge Proofs (ZKPs)
    • Homomorphic Encryption and Secret Sharing (HES)
    • Cryptographic System Analysis and Improvement (CSI)
  • Machine Learning and AI Security (Machine Learning and AI Security)
    • Adversarial Attacks and Defenses (AAD)
    • Data Privacy and Anonymization (Data Privacy and Anonymization)
    • Secure Multiparty Computation (SMC)
  • IoT and Embedded System Security (IoT and Embedded System Security)
    • Security for IoT Devices (IoT Device Security Measures)
    • Information Leakage in Embedded Systems (ILS)
  • Blockchain and Distributed Systems Security (Blockchain and Distributed Systems Security)
    • Blockchain Protocol Security (BPS)
    • Security Verification in Distributed Systems (SVDS)
  • Network Protocol and Infrastructure Security (NPS)
    • Routing Security
    • Privacy in Data Transmission (PDT)
  • Privacy and Anonymity (Privacy and Anonymity)
    • Data Anonymization Techniques (DAT)
    • Communication Privacy Mechanisms (CPMs)
  • Software Security Analysis (SSA)
    • Software Bug Finding and Fixing (Software Bug Finding and Fixing)
    • Static and Dynamic Program Analysis (Static and Dynamic Program Analysis)
  • Physical World Security and Privacy (PHYSICAL WORLD SECURITY AND PRIVACY)
    • Physical Attacks and Countermeasures (Physical Attacks and Countermeasures)
    • Side-Channel Attacks on Physical Devices (Side-Channel Attacks on Physical Devices)