Search for person "David Lange"
prev
next
34 min
Extending capability-based security models to achieve…
76 min
RSA factorization in the real world
65 min
Fun with lattices in cryptography and cryptanalysis
98 min
Essential Tips and Tricks
36 min
From eyelid blinks to speech recognition
61 min
fun(ctional) operating system and security protocol…
46 min
Strong metadata protection for asynchronous messaging
65 min
Take a deep breath into pollution trickery
prev
next