Search for ".uje" returned 3063 results

Revisiting SSL/TLS Implementations
55 min

Revisiting SSL/TLS Implementations

New Bleichenbacher Side Channels and Attacks

Practical Mix Network Design
46 min

Practical Mix Network Design

Strong metadata protection for asynchronous messaging

goto fail;
63 min

goto fail;

exploring two decades of transport layer insecurity

CloudABI
62 min

CloudABI

Pure capability-based security for UNIX

Trustworthy secure modular operating system engineering
61 min

Trustworthy secure modular operating system engineering

fun(ctional) operating system and security protocol…

35C3 Infrastructure Review
65 min

35C3 Infrastructure Review

Up and to the right: All the statistics about this event…

PQCHacks
60 min

PQCHacks

A gentle introduction to post-quantum cryptography

Forging the USB armory
30 min

Forging the USB armory

Creating an open source secure flash-drive-sized computer

Security of the IC Backside
59 min

Security of the IC Backside

The future of IC analysis

Script Your Car!
58 min

Script Your Car!

Using existing hardware platforms to integrate python into…

DPRK Consumer Technology
31 min

DPRK Consumer Technology

Facts to fight lore

Code BROWN in the Air
37 min

Code BROWN in the Air

A systemic update of sensitive information that you sniff…

Corporate surveillance, digital tracking, big data & privacy
62 min

Corporate surveillance, digital tracking, big data & privacy

How thousands of companies are profiling, categorizing,…

Why is GPG "damn near unusable"?
60 min

Why is GPG "damn near unusable"?

An overview of usable security research

Fuzzing the phone in the iPhone
55 min

Fuzzing the phone in the iPhone

D-d-d-di-di-d-d-di-d-di-d-di-d-dimm!