Search for "17" returned 4551 results
56 min
Reality Check! Basel/Lagos?? In virtual reality?
An African tale of art, culture and technology
60 min
Hacking Ecology
How Data Scientists can help to avoid a sixth global…
60 min
The Exploration and Exploitation of an SD Memory Card
by xobs & bunnie
32 min
The Universe Is, Like, Seriously Huge
Stuff in Space Is Far Away – but How Do We Know?
60 min
Are machines feminine?
exploring the relations between design and perception of…
60 min
Quantum Cryptography
from key distribution to position-based cryptography
60 min
Attacking end-to-end email encryption
Efail, other attacks and lessons learned.
41 min
NGI Zero: A treasure trove of IT innovation
Resilient. Trustworthy. Sustainably Open.
54 min
World War II Hackers
Stalin's best men, armed with paper and pen
55 min
The Gospel of IRMA
Attribute Based Credentials in Practice
58 min
Hacking how we see
A way to fix lazy eye?
34 min
Social Cooling - big data’s unintended side effect
How the reputation economy is creating data-driven…
57 min
Everything you want to know about x86 microcode, but might have been afraid to ask
An introduction into reverse-engineering x86 microcode and…
62 min