continue…
Related to
Software Protection and the TPM
A Hacker's Toolkit for RFID Emulation and Jamming
65 min
Trusted Computing und Digital Rights Management unter…
31 min
Resilienced Kryptographie
59 min