Search for "19" returned 4634 results
61 min
CAESAR and NORX
Developing the Future of Authenticated Encryption
58 min
Cyber all the Wassenaars
Export controls and exploit regulations: braindead and…
58 min
CHINTERNET ART
Creativity, Archives & Digital Media from the Chinese…
61 min
What Ever Happened to Nuclear Weapons?
Politics and Physics of a Problem That's Not Going Away
60 min
The Exploration and Exploitation of an SD Memory Card
by xobs & bunnie
60 min
Quantum Cryptography
from key distribution to position-based cryptography
57 min
A New Dark Age
Turbulence, Big Data, AI, Fake News, and Peak Knowledge
55 min
The Gospel of IRMA
Attribute Based Credentials in Practice
58 min
Protecting Your Privacy at the Border
Traveling with Digital Devices in the Golden Age of…
113 min
Methodisch inkorrekt!
Die Wissenschaftsgala vom 33C3
61 min
X Security
It's worse than it looks
59 min
Security of the IC Backside
The future of IC analysis
90 min