Search for person "Jan van Aken"
prev
next
23 min
World radio spectrum domination through silicon control
44 min
Documenting digital culture through handwritten letters
73 min
expanding the attack surface and then some
58 min
A survey of BSD kernel vulnerabilities.
38 min
oder wie man in einen Walfisch klettert, ohne ihn dabei zu…
29 min
Several failure modes of the hacker scene
51 min
A look at the security of 3rd party iOS applications
61 min
why clearing memory is hard.
25 min
Uptime and QoS monitor for geospatial web-services
prev
next