Search for "Harm Delva"
next
19 min
unlocking the potential of e-mail and the web
35 min
Taking a look at a covert CIA virtual fencing solution
65 min
First steps into space with sounding rockets
59 min
A Journey in the Land of (Cyber-)Espionage
46 min
Strong metadata protection for asynchronous messaging
58 min
Get a unique tour of some of the world’s most unusual…
46 min
Hacking your network likes it's 1980 again
46 min
rapid prototyping of digital fabrication and…
63 min
Developing open, FPGA-based capture hardware for conference…
next