Search for person "Marcel J. Dorsch"
next
42 min
Grundlagen der Datenzugriffsschnittstellen
62 min
Sharing experience about campaigning on the political field…
45 min
Reverse-engineering currency detection systems
48 min
Von Inodes und Directories zu Indirection, Extents,…
57 min
Vulnerabilities in the EMV Protocol
next