Search for "M" returned 11767 results
66 min
Keine Anhaltspunkte für flächendeckende Überwachung
Die Diskussion um NSA, PRISM, Tempora sprachlich und…
58 min
Self-encrypting deception
weaknesses in the encryption of solid state drives (SSDs)
58 min
RFID Treehouse of Horror
Hacking City-Wide Access Control Systems
57 min
Make Wi-Fi fast again
Eine kleine Einführung in den 802.11ac Standard
37 min
Hacking (with) a TPM
Don't ask what you can do for TPMs, Ask what TPMs can do…
55 min
Revisiting SSL/TLS Implementations
New Bleichenbacher Side Channels and Attacks
60 min
Are machines feminine?
exploring the relations between design and perception of…
51 min
Uncovering vulnerabilities in Hoermann BiSecur
An AES encrypted radio system
49 min
Toward a Cognitive "Quantified Self"
Activity Recognition for the Mind
62 min
Transhuman Expression
Interdisciplinary research in Painting and Robotics. with…
58 min
Glitching For n00bs
A Journey to Coax Out Chips' Inner Secrets
58 min