Search for "264" returned 2200 results

Security of the IC Backside
59 min

Security of the IC Backside

The future of IC analysis

What Ever Happened to Nuclear Weapons?
61 min

What Ever Happened to Nuclear Weapons?

Politics and Physics of a Problem That's Not Going Away

Quantum Cryptography
60 min

Quantum Cryptography

from key distribution to position-based cryptography

This Is Not A Game
63 min

This Is Not A Game

Eine kurze Geschichte von Q als Mindfuck-Spiel

Fuzzing the phone in the iPhone
55 min

Fuzzing the phone in the iPhone

D-d-d-di-di-d-d-di-d-di-d-di-d-dimm!

Archäologische Studien im Datenmüll
41 min

Archäologische Studien im Datenmüll

Welche Daten speichert Amazon über uns?

Briar
31 min

Briar

Resilient P2P Messaging for Everyone

Practical Mix Network Design
46 min

Practical Mix Network Design

Strong metadata protection for asynchronous messaging

In Search of Evidence-Based IT-Security
30 min

In Search of Evidence-Based IT-Security

IT security is largely a science-free field. This needs to…

Rebel Cities
33 min

Rebel Cities

Towards A Global Network Of Neighbourhoods And Cities…

Information Control and Strategic Violence
30 min

Information Control and Strategic Violence

How governments use censorship and surveillance as part of…