Search for "15" returned 4954 results

goto fail;
63 min

goto fail;

exploring two decades of transport layer insecurity

De-anonymizing Programmers
59 min

De-anonymizing Programmers

Large Scale Authorship Attribution from Executable Binaries…

Die dreckige Empirie
61 min

Die dreckige Empirie

Kann man empirischen Studien trauen?

Script Your Car!
58 min

Script Your Car!

Using existing hardware platforms to integrate python into…

Dead Man Edition
61 min

Dead Man Edition

Auf dem Weg zu fairer Elektronik am Beispiel der Elkos …

The Fight for Encryption in 2016
60 min

The Fight for Encryption in 2016

Crypto fight in the Wake of Apple v. FBI

Finding the Weak Crypto Needle in a Byte Haystack
32 min

Finding the Weak Crypto Needle in a Byte Haystack

Automatic detection of key-reuse vulnerabilities

Security of the IC Backside
59 min

Security of the IC Backside

The future of IC analysis

Protecting the Wild
57 min

Protecting the Wild

Conservation Genomics between Taxonomy, Big Data,…

What Ever Happened to Nuclear Weapons?
61 min

What Ever Happened to Nuclear Weapons?

Politics and Physics of a Problem That's Not Going Away

Quantum Cryptography
60 min

Quantum Cryptography

from key distribution to position-based cryptography

JODI - Apache is functioning normally
31 min

JODI - Apache is functioning normally

A net.art collective since 1995. Understanding the browser…