Search for person "David Kim" returned 138 results

44 min
Legacy Crypto Never Dies
Cracking DES nearly 20 years after the EFF DES Cracker

61 min
Enclosure-PUF
Tamper Proofing Commodity Hardware and other Applications

46 min
Practical Mix Network Design
Strong metadata protection for asynchronous messaging

58 min
SpiegelMining – Reverse Engineering von Spiegel-Online
Wer denkt, Vorratsdatenspeicherungen und „Big Data“ sind…

49 min
Dissecting VoLTE
Exploiting Free Data Channels and Security Problems

58 min
When hardware must „just work“
An inside look at x86 CPU design

38 min
On Computable Numbers with an Application to the Modelleisenbahn
Turing Train Terminal

27 min
Social Engineering und Industriespionage
Die unterschätzte Gefahr

52 min
Lies, damned lies and scans
"A copier's output equals its input." You think that's…

65 min
Rocket science – how hard can it be?
First steps into space with sounding rockets

63 min
Traue keinem Scan, den du nicht selbst gefälscht hast
"Bei Kopierern kommt das raus, was man reinsteckt." – Wer…

61 min