85 min
Advanced internet searching strategies & "wizard seeking"…
34 min
Introducing the 'lingua franca' of Instant Messaging
117 min
No stone unturned or: logs, what logs?
110 min
SPAM- und Zombie-Abwehr bei hohem Mail-Volumen am Beispiel…
115 min
Implementation and detection of kernel based backdoors and…
52 min
Security Concepts, Problems, and Exploits on Your Mac
64 min
Untersuchung eines Austauschsystems für hochsensible…
45 min
Reconfigurable computing for the kernel
46 min
Suppression of secure communications by governments
29 min
WLANs mit Wi-Fi Protected Access (WPA) betreiben
45 min
Reverse-engineering currency detection systems
58 min
The Good, the Bad and the Ugly