Search for "big data"
prev
next
55 min
A gentle introduction to elliptic-curve cryptography
54 min
The history and costs of government exceptional access
43 min
Analysing the terminology of the UK’s Snooper’s Charter
57 min
From DEFCON to the DARPA Cyber Grand Challenge
64 min
The Role of Stylometry in Privacy
32 min
Forcing the Netherlands to publicly debate privacy and the…
61 min
A Deep Technical Analysis
65 min
Up and to the right: All the statistics about this event…
34 min
modular and precise resource management
prev
next