Search for person "Guido van 't Noordende" returned 137 results

53 min
Smart, safe & happy
ensuring civil rights in the digital era

31 min
PUFs, protection, privacy, PRNGs
an overview of physically unclonable functions

42 min
A world without blockchain
How (inter)national money transfers works

27 min
Detecting a breach from an attackers perspective.
We're gonna regret this

58 min
OpenINTEL: digging in the DNS with an industrial size digger
I measured 60% of the DNS, and I found this

60 min
Flip Feng Shui
Advanced Rowhammer exploitation on cloud, desktop, and…

60 min
Windows drivers attack surface
some 'new' insights

61 min
Avoiding kernel panic: Europe’s biggest fails in digital policy-making
How the institutions fuck up, and how we fuck it up as well

27 min
Die Informatik-Sammlung Erlangen (ISER)
Einblicke in die historische Entwicklung der Computertechnik

45 min
Time affects
Human-computer-synchronizations

28 min
Long war tactics
or how we learned to stop worrying and love the NSA

58 min
Cyber all the Wassenaars
Export controls and exploit regulations: braindead and…

29 min
Infocalypse now: P0wning stuff is not enough
Several failure modes of the hacker scene

61 min
X Security
It's worse than it looks

61 min
Now I sprinkle thee with crypto dust
Internet reengineering session

59 min
Security Evaluation of Russian GOST Cipher
Survey of All Known Attacks on Russian Government…

58 min
Setting mobile phones free
An overview of a mobile telephony market and how a…

55 min
Our daily job: hacking the law
The key elements of policy hacking

39 min