Search for person "David Croft et al"

Little Services, Big Risks
34 min

Little Services, Big Risks

Extending capability-based security models to achieve…

When hardware must „just work“
58 min

When hardware must „just work“

An inside look at x86 CPU design

How to Destroy a Laptop with Top Secrets
58 min

How to Destroy a Laptop with Top Secrets

How did GCHQ do it to the Guardian's copy of Snowden's…

Syrian Archive
30 min

Syrian Archive

Preserving documentation of human rights violations

Trustworthy secure modular operating system engineering
61 min

Trustworthy secure modular operating system engineering

fun(ctional) operating system and security protocol…

Practical Mix Network Design
46 min

Practical Mix Network Design

Strong metadata protection for asynchronous messaging