Search for "374" returned 1964 results
60 min
Attacking end-to-end email encryption
Efail, other attacks and lessons learned.
54 min
Tactical Embodiment
Activism and Performance In Hostile Spaces Online
49 min
Electromagnetic Threats for Information Security
Ways to Chaos in Digital and Analogue Electronics
61 min
Beeinflussung durch Künstliche Intelligenz
Über die Banalität der Beeinflussung und das Leben mit…
57 min
Make Wi-Fi fast again
Eine kleine Einführung in den 802.11ac Standard
63 min
Reconstructing narratives
transparency in the service of justice
51 min
Uncovering vulnerabilities in Hoermann BiSecur
An AES encrypted radio system
57 min
Everything you want to know about x86 microcode, but might have been afraid to ask
An introduction into reverse-engineering x86 microcode and…
63 min
The Global Assassination Grid
The Infrastructure and People behind Drone Killings
59 min
Top X* usability obstacles
*(will be specified later based on usability test with…
49 min
Toward a Cognitive "Quantified Self"
Activity Recognition for the Mind
60 min