Search for "20" returned 4812 results

Briar
31 min

Briar

Resilient P2P Messaging for Everyone

Rowhammer.js: Root privileges for web apps?
30 min

Rowhammer.js: Root privileges for web apps?

A tale of fault attacks on DRAM and attacks on CPU caches

Rebel Cities
33 min

Rebel Cities

Towards A Global Network Of Neighbourhoods And Cities…

This is NOT a proposal about mass surveillance!
43 min

This is NOT a proposal about mass surveillance!

Analysing the terminology of the UK’s Snooper’s Charter

In Search of Evidence-Based IT-Security
30 min

In Search of Evidence-Based IT-Security

IT security is largely a science-free field. This needs to…

Why is GPG "damn near unusable"?
60 min

Why is GPG "damn near unusable"?

An overview of usable security research

ID Cards in China: Your Worst Nightmare
39 min

ID Cards in China: Your Worst Nightmare

In China Your ID Card Knows Everything

The Ultimate Acorn Archimedes talk
58 min

The Ultimate Acorn Archimedes talk

Everything about the Archimedes computer (with zero…

Beeinflussung durch Künstliche Intelligenz
61 min

Beeinflussung durch Künstliche Intelligenz

Über die Banalität der Beeinflussung und das Leben mit…

Trügerische Sicherheit
61 min

Trügerische Sicherheit

Wie die Überwachung unsere Sicherheit gefährdet

Quantum Cryptography
60 min

Quantum Cryptography

from key distribution to position-based cryptography

Security Nightmares
90 min

Security Nightmares

Damit Sie auch morgen schlecht von Ihrem Computer träumen.…

Computer Science in the DPRK
33 min

Computer Science in the DPRK

A view into technology on the other side of the world

A la recherche de l'information perdue
54 min

A la recherche de l'information perdue

some technofeminist reflections on Wikileaks