Search for person "D. J. Bernstein" returned 31 results

45 min
The Convergence of Anti-Counterfeiting and Computer Security
Reverse-engineering currency detection systems

42 min
Covert channels in TCP/IP: attack and defence
Creation and detection of IP steganography for covert…

62 min
Detecting temperature through clock skew
Hot or Not: Defeating anonymity by monitoring clock skew to…

62 min
Distributed campaigns for promoting and defending freedom in digital societies
Sharing experience about campaigning on the political field…

62 min
Relay attacks on card payment: vulnerabilities and defences
Keeping your enemies close

58 min
Security Failures in Smart Card Payment Systems
Tampering the Tamper-Proof

57 min
Chip and PIN is Broken
Vulnerabilities in the EMV Protocol

59 min