Search for person "David Hebbeker"
prev
next
21 min
A collection of network configuration libraries
44 min
Cracking DES nearly 20 years after the EFF DES Cracker
46 min
Strong metadata protection for asynchronous messaging
61 min
Tamper Proofing Commodity Hardware and other Applications
58 min
Wer denkt, Vorratsdatenspeicherungen und „Big Data“ sind…
58 min
An inside look at x86 CPU design
52 min
"A copier's output equals its input." You think that's…
prev
next