Search for "374" returned 1964 results
30 min
Forging the USB armory
Creating an open source secure flash-drive-sized computer
63 min
Das Assange-Auslieferungsverfahren
Als Prozessbeobachter in London
70 min
Security Nightmares 0x14
Was Sie schon immer nicht über darüber wissen wollten wer…
58 min
Wie klimafreundlich ist Software?
Einblicke in die Forschung und Ausblick in die…
58 min
How risky is the software you use?
CITL: Quantitative, Comparable Software Risk Reporting
46 min
Electronic Evicence in Criminal Matters
An introduction and critique of the EC proposal for a…
51 min
Virtual Secure Boot
Secure Boot support in qemu, kvm and ovmf.
63 min
A look into the Mobile Messaging Black Box
A gentle introduction to mobile messaging and subsequent…
49 min
Dissecting VoLTE
Exploiting Free Data Channels and Security Problems
41 min
Extracting keys from FPGAs, OTP Tokens and Door Locks
Side-Channel (and other) Attacks in Practice
58 min
Switches Get Stitches
Industrial System Ownership
64 min
Source Code and Cross-Domain Authorship Attribution
The Role of Stylometry in Privacy
61 min
How Alice and Bob meet if they don't like onions
Survey of Network Anonymisation Techniques
55 min