Search for "536" returned 1932 results
62 min
Kyber and Post-Quantum Crypto
How does it work?
70 min
Security Nightmares 0x14
Was Sie schon immer nicht über darüber wissen wollten wer…
58 min
Wie klimafreundlich ist Software?
Einblicke in die Forschung und Ausblick in die…
46 min
Electronic Evicence in Criminal Matters
An introduction and critique of the EC proposal for a…
51 min
Virtual Secure Boot
Secure Boot support in qemu, kvm and ovmf.
63 min
A look into the Mobile Messaging Black Box
A gentle introduction to mobile messaging and subsequent…
49 min
Dissecting VoLTE
Exploiting Free Data Channels and Security Problems
41 min
Extracting keys from FPGAs, OTP Tokens and Door Locks
Side-Channel (and other) Attacks in Practice
58 min
Switches Get Stitches
Industrial System Ownership
43 min
Tractors, Rockets and the Internet in Belarus
How belarusian authoritarian regime is using technologies…
55 min
Nach der Coronakrise ist mitten in der Klimakrise
Wege aus der Klimakrise - Was uns droht und was getan…
29 min