Search for "Lisa" returned 969 results
58 min
Hacking how we see
A way to fix lazy eye?
62 min
Corporate surveillance, digital tracking, big data & privacy
How thousands of companies are profiling, categorizing,…
58 min
The Magic World of Searchable Symmetric Encryption
A brief introduction to search over encrypted data
55 min
White-Box Cryptography
Survey
55 min
ZombieLoad Attack
Leaking Your Recent Memory Operations on Intel CPUs
56 min
Rock' em Graphic Cards
Introduction to Heterogeneous Parallel Programming
55 min
Graphs, Drones & Phones
The role of social-graphs for Drones in the War on Terror.
62 min
The Tor Network
We're living in interesting times
53 min
Million Dollar Dissidents and the Rest of Us
Uncovering Nation-State Mobile Espionage in the Wild
59 min
Towards General Purpose Reconfigurable Computing on Novena
FPGAs for Everybody with Novena
77 min
Entbehrliches
Unterhaltsames Wissen aus der Wikipedia
62 min
A hacker's guide to Climate Change - What do we know and how do we know it?
An introduction to the basics of climate research and what…
60 min
The Fight for Encryption in 2016
Crypto fight in the Wake of Apple v. FBI
58 min
Script Your Car!
Using existing hardware platforms to integrate python into…
61 min
Safe and Secure Drivers in High-Level Languages
How to write PCIe drivers in Rust, go, C#, Swift, Haskell,…
60 min