Search for "nook" returned 2101 results

PUFs, protection, privacy, PRNGs
31 min

PUFs, protection, privacy, PRNGs

an overview of physically unclonable functions

TrustZone is not enough
31 min

TrustZone is not enough

Hijacking debug components for embedded security

The Gospel of IRMA
55 min

The Gospel of IRMA

Attribute Based Credentials in Practice

Sendezentrum: Who Killed The Internet?
46 min

Sendezentrum: Who Killed The Internet?

And a promising alternative for Public Communication and…

Untrusting the CPU
61 min

Untrusting the CPU

A proposal for secure computing in an age where we cannot…

Corona-Warn-App
41 min

Corona-Warn-App

Behind the scenes: Invisible, yet important

To Protect And Infect
45 min

To Protect And Infect

The militarization of the Internet

Attacking end-to-end email encryption
60 min

Attacking end-to-end email encryption

Efail, other attacks and lessons learned.

An introduction to Firmware Analysis
40 min

An introduction to Firmware Analysis

Techniques - Tools - Tricks

CIA vs. Wikileaks
58 min

CIA vs. Wikileaks

Intimiditation surveillance and other tactics observed and…

All Our Shared Spectrum Are Belong to Us
30 min

All Our Shared Spectrum Are Belong to Us

Visualizing WLAN Channel Usage on OpenWRT

Beyond Virtual and Augmented Reality
33 min

Beyond Virtual and Augmented Reality

From Superhuman Sports to Amplifying Human Senses

library operating systems
32 min

library operating systems

reject the default reality^W abstractions and substitute…