45 min
Reconfigurable computing for the kernel
52 min
Security Concepts, Problems, and Exploits on Your Mac
46 min
Suppression of secure communications by governments
110 min
SPAM- und Zombie-Abwehr bei hohem Mail-Volumen am Beispiel…
85 min
Advanced internet searching strategies & "wizard seeking"…
64 min
Untersuchung eines Austauschsystems für hochsensible…
117 min
No stone unturned or: logs, what logs?
115 min
Implementation and detection of kernel based backdoors and…
58 min
The Good, the Bad and the Ugly
29 min
WLANs mit Wi-Fi Protected Access (WPA) betreiben
45 min
Reverse-engineering currency detection systems
34 min
Introducing the 'lingua franca' of Instant Messaging