Search for person "Angela Mueller"
54 min
Activism and Performance In Hostile Spaces Online
54 min
A glimpse into advanced cryptogrpahic schemes
73 min
GNOME 3.12 - Design Decisions, Main Changes, Future Visions
30 min
Cloud Computing, Assessment, and Fools like Me.
45 min
Micro keysigning parties for the masses
40 min
Decrypting files hijacked by the "second most used…
49 min
Or: How taint tracking in Chromium works
58 min
A brief introduction to search over encrypted data
61 min
Survey of Network Anonymisation Techniques
63 min
How to understand this historic challenge and what we can…