All
Search
Images
Videos
Shorts
Maps
News
More
Shopping
Flights
Travel
Notebook
Report an inappropriate content
Please select one of the options below.
Not Relevant
Offensive
Adult
Child Sexual Abuse
Length
All
Short (less than 5 minutes)
Medium (5-20 minutes)
Long (more than 20 minutes)
Date
All
Past 24 hours
Past week
Past month
Past year
Resolution
All
Lower than 360p
360p or higher
480p or higher
720p or higher
1080p or higher
Source
All
Dailymotion
Vimeo
Metacafe
Hulu
VEVO
Myspace
MTV
CBS
Fox
CNN
MSN
Price
All
Free
Paid
Clear filters
SafeSearch:
Moderate
Strict
Moderate (default)
Off
Filter
Gear ordered online can intercept secret satellite data | Cybernews
4 months ago
cybernews.com
Candidate Indistinguishability Obfuscation and Functional Encry
…
Feb 21, 2014
Microsoft
Homomorphic Encryption from Ring Learning with Errors
Apr 27, 2012
Microsoft
Functional encryption from LWE
Mar 27, 2014
Microsoft
Verifiable Functional Encryption - Microsoft Research
Jul 22, 2016
Microsoft
Computing on Encryption Data: Functional Encryption and More
Mar 10, 2015
Microsoft
2:03:14
Predicate Encryption; Structured Encryption and Controlled Disclos
…
Sep 8, 2010
Microsoft
0:10
Looking for the latest functional bag to elevate your everyday carry? ✨�
…
258 views
Mar 1, 2025
Facebook
Fourways Mall
Future-Proof Encryption
74 views
Nov 1, 2013
acm.org
51:30
Fully Homomorphic Encryption over the Integers with Shorter Public K
…
Jul 1, 2011
Microsoft
0:58
20 reactions | Can you spot the differences from this video and th
…
739 views
2 weeks ago
Facebook
Powertec
Chinese researchers claim that quantum computers can already d
…
Jan 13, 2023
gigazine.net
[Hot Item] Ham Radio 10W Walkie Talkie Iradio R6000 Two Way Radi
…
2 months ago
made-in-china.com
0:32
How good is our Canning Vale store? Packed wall to wall with
…
500 views
1 week ago
Facebook
Flex Fitness Equipment
0:48
Moonlight Maze Cyber Espionage Case
3 weeks ago
YouTube
Samuel Nwokemodo
57:11
Sept 12 2025 Tutte Colloquium - Roman Langrehr
2 views
5 months ago
YouTube
Combinatorics & Optimization University of Wat…
23:30
The End of Static Cryptography: What Leaders Must Understand Now
1 month ago
YouTube
PQShield
3:23
How Do Anthropologists Ensure Digital Security During Fieldwork?
1 month ago
YouTube
Anthropology Insights
14:35
The Future Was Programmed Yesterday—Welcome to Quantum
…
7 views
2 months ago
YouTube
NUX'S CASTLE: TECH
0:30
Graph Layer Security Encrypting Information via Networked Physic
…
786 views
2 months ago
YouTube
Electrical Research
0:47
Threat Surface on Instagram: "U.S. investigators discovered a ghost
…
99 views
3 weeks ago
Instagram
threatsurface
1:17:32
Mixed Functional Encryption Applications to Traitor Tracing
10 views
3 weeks ago
bilibili
3cH0_Nu1L
1:24
Michael Boyle | Can’t believe it’s almost 10 years. Version 3 is on th
…
9.4K views
3 months ago
Instagram
michael_boyle1959
1:03
Check out my latest Functional art. All in 1095 and desert Ironwoon. A
…
581 views
4 months ago
TikTok
markmccounblades
2:09
The Bioness H200
34.2K views
May 13, 2014
YouTube
PhysioFunction
1:01
LaCie Mirror
73.8K views
Jan 4, 2015
YouTube
LaCie
Functional Encryption 1 (Asiacrypt 2023)
276 views
Dec 7, 2023
YouTube
IACR
Two-Client Inner-Product Functional Encryption with an Application to
…
Nov 8, 2022
acm.org
5:54
The Safety Inspection Process
55.7K views
May 29, 2014
YouTube
WorkSafeBC
47:35
Intro to Neuroscience
934.3K views
Sep 17, 2017
YouTube
Neuroscience Online
See more videos
More like this
Feedback