Search for person "Marcel J. Dorsch"
prev
48 min
Von Inodes und Directories zu Indirection, Extents,…
57 min
Vulnerabilities in the EMV Protocol
58 min
Tampering the Tamper-Proof
62 min
Sharing experience about campaigning on the political field…
62 min
Keeping your enemies close
62 min
Hot or Not: Defeating anonymity by monitoring clock skew to…
42 min
Creation and detection of IP steganography for covert…
93 min
A roundup and live demonstrations of all currently known…
45 min
Reverse-engineering currency detection systems
prev