Search for "Noa"
next
56 min
New security recommendations for OAuth
49 min
From Cyberfeminism to XenoFeminism
55 min
Protective Optimization Technologies
60 min
Insights into neurology and psychological behaviours…
31 min
Hijacking debug components for embedded security
26 min
or when and how not to use indexes
60 min
Wie die GFF mit strategischen Klagen für Freiheitsrechte…
33 min
Can you knot or can you not ?
35 min
How (not) to protect private keys