Search for person "David Croft et al" returned 138 results

61 min
Enclosure-PUF
Tamper Proofing Commodity Hardware and other Applications

31 min
The Clash of Digitalizations
The Devolution of Arab Men from Humans to Digital Fodder

58 min
SpiegelMining – Reverse Engineering von Spiegel-Online
Wer denkt, Vorratsdatenspeicherungen und „Big Data“ sind…

30 min
Syrian Archive
Preserving documentation of human rights violations

56 min
The mummy unwrapped
Cultural Commons durch Kunstraub

53 min
No Love for the US Gov.
Why Lauri Love’s case is even more important than you…

58 min
When hardware must „just work“
An inside look at x86 CPU design

38 min
On Computable Numbers with an Application to the Modelleisenbahn
Turing Train Terminal

27 min
Social Engineering und Industriespionage
Die unterschätzte Gefahr

52 min
Lies, damned lies and scans
"A copier's output equals its input." You think that's…

58 min
How to Destroy a Laptop with Top Secrets
How did GCHQ do it to the Guardian's copy of Snowden's…

65 min
Rocket science – how hard can it be?
First steps into space with sounding rockets

63 min
Traue keinem Scan, den du nicht selbst gefälscht hast
"Bei Kopierern kommt das raus, was man reinsteckt." – Wer…

61 min