Search result for Secure computation Online Courses & Certifications
Get Course Alerts by Email
Applied Cryptography
by Dave Evans- 0.0
Approx. 2 months
lesson 5 Public Key Protocols Encrypted key exchange certificates secure commerce. lesson 7 Secure Computation Computing without exposing data....
Free
Security and Privacy for Big Data - Part 2
by Enrique Barra , Fabian Garcia Pastor- 4.7
Approx. 1 hour to complete
Secure Multiparty Computation Know concepts like anonymization and pseudonymization, k-anonymity, differential privacy, secure multiparty computation, and homomorphic encryption....
Quantum Networking
by Mahdi Hosseini- 0.0
5 Weeks
Applying exotic quantum properties such as entanglement to every-day applications such as communication and computation reveals new dimensions of such applications. Quantum encoding and entanglement distribution provide means to establish fundamentally secure communication links for transfer of classical and quantum data....
$750
Visual C# and ADO.NET Programming
by Everest Nwosu- 3.8
9.5 hours on-demand video
NET Secure Database Programming, Searching Mechanism, Printing Functionality, Payroll Computation, Reporting Facilities, Multiple Document Interface & MenuStrip, Registration & Log In functionality, System Implementation and Deployment....
$12.99
The Quantum Internet and Quantum Computers: How Will They Change the World?
by Stephanie Wehner , Lieven Vandersypen , Menno Veldhorst- 0.0
6 Weeks
You’ll explore various application areas, such as quantum chemistry, quantum machine learning, encryption and secure communication, factorization, and blind quantum computation....
$50
Keras Deep Learning Python Crash Course: Learn Keras Today!
by Ivan Westen- 3.7
2 hours on-demand video
With the availability of lots of data and huge computation power, this field is advancing very rapidly and is very exiting. 3: Get Chosen over your competitors: The addition of Deep Learning knowledge with your IT background will enable you to stand apart from your competitors and help you secure the dream job....
$12.99
Teaching Impacts of Technology: Data Collection, Use, and Privacy
by Beth Simon- 4.6
Approx. 13 hours to complete
Secure Web Browsing: HTTPS Keeping Information Secure on the Internet: Hashing and Encryption...
Related searches
Internet History, Technology, and Security
by Charles Russell Severance- 4.8
Approx. 15 hours to complete
Security Public/Private Key - Secure Sockets...
Cyber Attack Countermeasures
by Dr. Edward G. Amoroso- 4.8
Approx. 19 hours to complete
Modern certification authority-based cryptographic support is also discussed and shown to provide basis for secure e-commerce using Secure Sockets Layer (SSL) schemes. Secure Sockets Layer...