Search for person "Elke Steven"
60 min
Tales and experiences with people, ways of working, and…
57 min
Vulnerabilities in the EMV Protocol
58 min
Tampering the Tamper-Proof
45 min
Reverse-engineering currency detection systems
42 min
Creation and detection of IP steganography for covert…
62 min
Hot or Not: Defeating anonymity by monitoring clock skew to…
62 min
Keeping your enemies close
41 min
Langfristig bezahlbares, gemeinsames „Mieteigentum“…