Search for person "David Croft et al"
prev
next
34 min
Extending capability-based security models to achieve…
58 min
An inside look at x86 CPU design
58 min
How did GCHQ do it to the Guardian's copy of Snowden's…
30 min
Preserving documentation of human rights violations
98 min
Essential Tips and Tricks
36 min
From eyelid blinks to speech recognition
61 min
fun(ctional) operating system and security protocol…
46 min
Strong metadata protection for asynchronous messaging
prev
next