Search for "28" returned 4262 results

Taking a scalpel to QNX
46 min

Taking a scalpel to QNX

Analyzing & Breaking Exploit Mitigations and Secure Random…

Cyber all the Wassenaars
58 min

Cyber all the Wassenaars

Export controls and exploit regulations: braindead and…

Wireless Drivers: Freedom considered harmful?
51 min

Wireless Drivers: Freedom considered harmful?

An OpenWrt perspective on the development of Linux 802.11…

The Nibbletronic
20 min

The Nibbletronic

A DIY MIDI Controller and a New UI for Wind Instruments

Security of the IC Backside
59 min

Security of the IC Backside

The future of IC analysis

Wohnungsbot: An Automation-Drama in Three Acts
40 min

Wohnungsbot: An Automation-Drama in Three Acts

A media-art project which automates the search for flats in…

Quantum Cryptography
60 min

Quantum Cryptography

from key distribution to position-based cryptography

What Ever Happened to Nuclear Weapons?
61 min

What Ever Happened to Nuclear Weapons?

Politics and Physics of a Problem That's Not Going Away

A New Dark Age
57 min

A New Dark Age

Turbulence, Big Data, AI, Fake News, and Peak Knowledge

Protecting Your Privacy at the Border
58 min

Protecting Your Privacy at the Border

Traveling with Digital Devices in the Golden Age of…

The Gospel of IRMA
55 min

The Gospel of IRMA

Attribute Based Credentials in Practice