Search for person "Angela Mueller"
40 min
Decrypting files hijacked by the "second most used…
54 min
Activism and Performance In Hostile Spaces Online
63 min
How to understand this historic challenge and what we can…
61 min
Survey of Network Anonymisation Techniques
54 min
A glimpse into advanced cryptogrpahic schemes
45 min
Micro keysigning parties for the masses
58 min
A brief introduction to search over encrypted data
49 min
Or: How taint tracking in Chromium works
73 min
GNOME 3.12 - Design Decisions, Main Changes, Future Visions
30 min
Cloud Computing, Assessment, and Fools like Me.