Search for "18" returned 4652 results
63 min
The Cloud Conspiracy 2008-2014
how the EU was hypnotised that the NSA did not exist
61 min
Untrusting the CPU
A proposal for secure computing in an age where we cannot…
60 min
Sneaking In Network Security
Enforcing strong network segmentation, without anyone…
58 min
Virtual Machine Introspection
From the Outside Looking In
58 min
Die Krise der Bilder ist die Krise der Politik
Die Krise der Politik ist die Krise der Bilder
62 min
Kyber and Post-Quantum Crypto
How does it work?
58 min
The Internet in Cuba: A Story of Community Resilience
Get a unique tour of some of the world’s most unusual…
51 min
Haecksen gegen Cyberstalking
Ein Bericht vom Anti-Stalking Projekt
62 min
SuperMUC-NG
… und das Rennen um den schnellsten Computer der Welt
64 min
Source Code and Cross-Domain Authorship Attribution
The Role of Stylometry in Privacy
61 min
Warum die Digitale Revolution des Lernens gescheitert ist.
Fünf Desillusionen
53 min
When algorithms fail in our personal lives
Social media break up coordinator
62 min
The Internet (Doesn't) Need Another Security Guide
Creating Internet Privacy and Security Resources That Don't…
54 min