Search for "41" returned 3836 results

Simulating the future of the global agro-food system
35 min

Simulating the future of the global agro-food system

Cybernetic models analyze scenarios of interactions between…

Beyond Virtual and Augmented Reality
33 min

Beyond Virtual and Augmented Reality

From Superhuman Sports to Amplifying Human Senses

SELECT code_execution FROM * USING SQLite;
46 min

SELECT code_execution FROM * USING SQLite;

--Gaining code execution using a malicious SQLite database

calc.pw
30 min

calc.pw

Passwortgenerierung mit Arduino [Generating passwords with…

Why is GPG "damn near unusable"?
60 min

Why is GPG "damn near unusable"?

An overview of usable security research

Hacking the Nintendo Game & Watch
42 min

Hacking the Nintendo Game & Watch

Your princess is AES encrypted in another castle

Building Custom Pinball Machines
63 min

Building Custom Pinball Machines

What you need and how it works. An experiences report

Finding the Weak Crypto Needle in a Byte Haystack
32 min

Finding the Weak Crypto Needle in a Byte Haystack

Automatic detection of key-reuse vulnerabilities

Hardening hardware and choosing a #goodBIOS
47 min

Hardening hardware and choosing a #goodBIOS

Clean boot every boot - rejecting persistence of malicious…

25 Jahre Chipkarten-Angriffe
61 min

25 Jahre Chipkarten-Angriffe

Von der Historie zur Zukunft

What Price the Upload Filter?
54 min

What Price the Upload Filter?

The history and costs of government exceptional access

Trustworthy secure modular operating system engineering
61 min

Trustworthy secure modular operating system engineering

fun(ctional) operating system and security protocol…