Search for "12" returned 5156 results

Security of the IC Backside
59 min

Security of the IC Backside

The future of IC analysis

We should share our secrets
59 min

We should share our secrets

Shamir secret sharing: How it works and how to implement it

PLC-Blaster
58 min

PLC-Blaster

Ein Computerwurm für PLCs

"Fluxus cannot save the world."
57 min

"Fluxus cannot save the world."

What hacking has to do with avantgarde art of the 1960ies…

What Ever Happened to Nuclear Weapons?
61 min

What Ever Happened to Nuclear Weapons?

Politics and Physics of a Problem That's Not Going Away

Practical Mix Network Design
46 min

Practical Mix Network Design

Strong metadata protection for asynchronous messaging

Vor Windows 8 wird gewarnt
60 min

Vor Windows 8 wird gewarnt

Und nichts (Secure) Bootet mehr?

Quantum Cryptography
60 min

Quantum Cryptography

from key distribution to position-based cryptography

The Great Escape of ESXi
40 min

The Great Escape of ESXi

Breaking Out of a Sandboxed Virtual Machine

In Search of Evidence-Based IT-Security
30 min

In Search of Evidence-Based IT-Security

IT security is largely a science-free field. This needs to…

apertus° AXIOM
30 min

apertus° AXIOM

The first Open Source Cinema Camera

Briar
31 min

Briar

Resilient P2P Messaging for Everyone

Information Control and Strategic Violence
30 min

Information Control and Strategic Violence

How governments use censorship and surveillance as part of…