Search for "ths" returned 8600 results

Mining Search Queries
49 min

Mining Search Queries

How to discover additional knowledge in the AOL query logs

Information Operations
76 min

Information Operations

Sector-Oriented Analysis of the Potential Impact and…

eVoting after Nedap and Digital Pen
65 min

eVoting after Nedap and Digital Pen

Why cryptography might not fix the issue of transparent…

Defend your Freedoms Online: It's Political, Stupid!
61 min

Defend your Freedoms Online: It's Political, Stupid!

A Positive agenda against the next ACTA, SOPA, and such

Vulnerability markets
59 min

Vulnerability markets

What is the economic value of a zero-day exploit?

Know your compiler
53 min

Know your compiler

...and what the optimizer does so you don't have to

TASBot OoT ACE:
48 min

TASBot OoT ACE:

How to get the Triforce on an N64 via controller input

TrustZone-M(eh): Breaking ARMv8-M's security
57 min

TrustZone-M(eh): Breaking ARMv8-M's security

Hardware attacks on the latest generation of ARM Cortex-M…

Paranoid Machines
59 min

Paranoid Machines

threads of symptom and haunting woven throughout the…

We are all lawmakers!
56 min

We are all lawmakers!

How to further transparency by law – the Hamburg example…

Long war tactics
28 min

Long war tactics

or how we learned to stop worrying and love the NSA

Electronic Evicence in Criminal Matters
46 min

Electronic Evicence in Criminal Matters

An introduction and critique of the EC proposal for a…

Is my system fast?
36 min

Is my system fast?

An introduction of some tools that help to answer this…

Syscall proxying fun and applications
49 min

Syscall proxying fun and applications

Introduction to syscall proxying and applications for in…

Household, Totalitarianism and Cyberspace
56 min

Household, Totalitarianism and Cyberspace

Philosophical Perspectives on Privacy Drawing on the…

Provable Security
59 min

Provable Security

How I learned to stop worrying and love the backdoor

Copywrongs 2.0
61 min

Copywrongs 2.0

We must prevent EU copyright reform from breaking the…

Decentralized clustering
37 min

Decentralized clustering

Making the net - even if your local dicators hate it!

Test-Driven Web Development
47 min

Test-Driven Web Development

Treating your web application like the grown-up it is

Hosting a Hacking Challenge - CTF-style
45 min

Hosting a Hacking Challenge - CTF-style

Background information on CIPHER, an international…