Search for person "Jeroen van der Ham"
prev
next
42 min
How (inter)national money transfers works
31 min
an overview of physically unclonable functions
53 min
An analysis of targeted attacks from 2005 to 2007
44 min
If technology is the solution, politicians are the problem
28 min
or how we learned to stop worrying and love the NSA
73 min
expanding the attack surface and then some
58 min
A survey of BSD kernel vulnerabilities.
prev
next