Search for person "Steven Ottens"
Vulnerabilities in the EMV Protocol
Tampering the Tamper-Proof
Keeping your enemies close
Hot or Not: Defeating anonymity by monitoring clock skew to…
Creation and detection of IP steganography for covert…
Reverse-engineering currency detection systems