Search for person "Angela Mueller"
54 min
Activism and Performance In Hostile Spaces Online
30 min
Cloud Computing, Assessment, and Fools like Me.
54 min
A glimpse into advanced cryptogrpahic schemes
45 min
Micro keysigning parties for the masses
40 min
Decrypting files hijacked by the "second most used…
73 min
GNOME 3.12 - Design Decisions, Main Changes, Future Visions
49 min
Or: How taint tracking in Chromium works
58 min
A brief introduction to search over encrypted data
61 min
Survey of Network Anonymisation Techniques
63 min
How to understand this historic challenge and what we can…