Search for "Lisa" returned 984 results
29 min
The Urban Organism
Hacking [in] Hong Kong
39 min
Tales of old: untethering iOS 11
Spoiler: Apple is bad at patching
61 min
CAESAR and NORX
Developing the Future of Authenticated Encryption
47 min
All cops are broadcasting
Obtaining the secret TETRA primitives after decades in the…
60 min
Concepts for global TSCM
getting out of surveillance state mode
47 min
Jailbreaking iOS
From past to present
31 min
The Zcash anonymous cryptocurrency
or zero-knowledge succinct non-interactive arguments of…
43 min
No PoC? No Fix! - A sad Story about Bluetooth Security
It is just a broken memcpy in the Bluetooth stack. Do we…
61 min
Reconstructing game footage from a Game Boy's memory bus
The GB Interceptor
60 min
The rise and fall of Internet voting in Norway
Evaluating a complex cryptographic implementation
61 min
How Alice and Bob meet if they don't like onions
Survey of Network Anonymisation Techniques
39 min
The Eye on the Nile
Egypt's Civil Society Under Attack
59 min
Top X* usability obstacles
*(will be specified later based on usability test with…
38 min
Fairtronics
A Tool for Analyzing the Fairness of Electronic Devices
59 min
Talking Behind Your Back
On the Privacy & Security of the Ultrasound Tracking…
35 min
Low Cost Non-Invasive Biomedical Imaging
An Open Electrical Impedance Tomography Project
44 min