Search for "843" returned 1869 results
58 min
Self-encrypting deception
weaknesses in the encryption of solid state drives (SSDs)
49 min
BREACH in Agda
Security notions, proofs and attacks using dependently…
60 min
Concepts for global TSCM
getting out of surveillance state mode
58 min
Baseband Exploitation in 2013
Hexagon challenges
58 min
The Magic World of Searchable Symmetric Encryption
A brief introduction to search over encrypted data
58 min
Hacking how we see
A way to fix lazy eye?
56 min
Viva la Vita Vida
Hacking the most secure handheld console
58 min
When hardware must „just work“
An inside look at x86 CPU design
57 min
How I Learned to Stop Reinventing and Love the Wheels
or having FUN with (home/hackerspace) robotics
55 min
White-Box Cryptography
Survey
58 min
Decoding Contactless (Card) Payments
An Exploration of NFC Transactions and Explanation How…
62 min
Corporate surveillance, digital tracking, big data & privacy
How thousands of companies are profiling, categorizing,…
58 min
Paypals War on Terror
A Historical Re-Enactment of the PayPal14
60 min