Search for person "Walter van Host"
prev
next
31 min
an overview of physically unclonable functions
42 min
How (inter)national money transfers works
53 min
ensuring civil rights in the digital era
58 min
I measured 60% of the DNS, and I found this
60 min
Advanced Rowhammer exploitation on cloud, desktop, and…
29 min
Several failure modes of the hacker scene
58 min
Export controls and exploit regulations: braindead and…
53 min
NLNet sponsored (open hardware) trusted boot module
45 min
Human-computer-synchronizations
28 min
or how we learned to stop worrying and love the NSA
61 min
Internet reengineering session
58 min
An overview of a mobile telephony market and how a…
55 min
The key elements of policy hacking
38 min
oder wie man in einen Walfisch klettert, ohne ihn dabei zu…
51 min
A look at the security of 3rd party iOS applications
prev
next