Search for "nook" returned 2101 results
31 min
PUFs, protection, privacy, PRNGs
an overview of physically unclonable functions
39 min
Transmission Control Protocol
TCP/IP basics
31 min
TrustZone is not enough
Hijacking debug components for embedded security
55 min
The Gospel of IRMA
Attribute Based Credentials in Practice
46 min
Sendezentrum: Who Killed The Internet?
And a promising alternative for Public Communication and…
41 min
Framing digital industry into planetary limits and transition policies
The environmental costs of digital industry and pathways to…
61 min
Untrusting the CPU
A proposal for secure computing in an age where we cannot…
41 min
Corona-Warn-App
Behind the scenes: Invisible, yet important
45 min
To Protect And Infect
The militarization of the Internet
60 min
Attacking end-to-end email encryption
Efail, other attacks and lessons learned.
40 min
An introduction to Firmware Analysis
Techniques - Tools - Tricks
58 min
CIA vs. Wikileaks
Intimiditation surveillance and other tactics observed and…
30 min
All Our Shared Spectrum Are Belong to Us
Visualizing WLAN Channel Usage on OpenWRT
33 min
Beyond Virtual and Augmented Reality
From Superhuman Sports to Amplifying Human Senses
32 min