Search for "13" returned 4823 results
60 min
Attacking end-to-end email encryption
Efail, other attacks and lessons learned.
41 min
NGI Zero: A treasure trove of IT innovation
Resilient. Trustworthy. Sustainably Open.
58 min
Hacking how we see
A way to fix lazy eye?
25 min
Keys of Fury
Type In Beyond the Scrolling Horizon
30 min
The ArduGuitar
An Arduino Powered Electric Guitar
58 min
Baseband Exploitation in 2013
Hexagon challenges
49 min
Toward a Cognitive "Quantified Self"
Activity Recognition for the Mind
51 min
Uncovering vulnerabilities in Hoermann BiSecur
An AES encrypted radio system
51 min
Ecuador: how an authoritarian government is fooling the entire world
Guess what? The Government of Rafael Correa actually is…
60 min
Hacking Reality
Mixed Reality and multi-sensory communication
59 min
Memory Deduplication: The Curse that Keeps on Giving
A tale of 3 different memory deduplication based…
58 min
When hardware must „just work“
An inside look at x86 CPU design
55 min
White-Box Cryptography
Survey
57 min
How I Learned to Stop Reinventing and Love the Wheels
or having FUN with (home/hackerspace) robotics
60 min
Concepts for global TSCM
getting out of surveillance state mode
58 min
The Magic World of Searchable Symmetric Encryption
A brief introduction to search over encrypted data
60 min
Beyond Anti Evil Maid
Making it easier to avoid low-level compromise, and why…
62 min