Search for "26" returned 4319 results

Electronic Evicence in Criminal Matters
46 min

Electronic Evicence in Criminal Matters

An introduction and critique of the EC proposal for a…

31C3 Keynote
66 min

31C3 Keynote

A New Dawn

How Alice and Bob meet if they don't like onions
61 min

How Alice and Bob meet if they don't like onions

Survey of Network Anonymisation Techniques

Understanding millions of gates
35 min

Understanding millions of gates

Introduction to IC reverse engineering for…

The Machine To Be Another
30 min

The Machine To Be Another

Exploring identity and empathy through neuroscience,…

Security Nightmares 0x14
70 min

Security Nightmares 0x14

Was Sie schon immer nicht über darüber wissen wollten wer…

A look into the Mobile Messaging Black Box
63 min

A look into the Mobile Messaging Black Box

A gentle introduction to mobile messaging and subsequent…

One year of securitarian drift in France
27 min

One year of securitarian drift in France

From the Bill on Intelligence to the State of Emergency

Switches Get Stitches
58 min

Switches Get Stitches

Industrial System Ownership

Technomonopolies
26 min

Technomonopolies

How technology is used to subvert and circumvent…

Finding the Weak Crypto Needle in a Byte Haystack
32 min

Finding the Weak Crypto Needle in a Byte Haystack

Automatic detection of key-reuse vulnerabilities

Sanitizing PCAPs
43 min

Sanitizing PCAPs

Fun and games until someone uses IPv6 or TCP