Search for person "Walter van Holst (Vrijschrift)"
prev
next
53 min
An analysis of targeted attacks from 2005 to 2007
58 min
An overview of a mobile telephony market and how a…
31 min
an overview of physically unclonable functions
42 min
How (inter)national money transfers works
28 min
or how we learned to stop worrying and love the NSA
43 min
How to Stop the Dubious Use of Passenger Name Records by…
44 min
Documenting digital culture through handwritten letters
prev
next