Search for person "Paul H" returned 95 results

Finding the Weak Crypto Needle in a Byte Haystack
32 min

Finding the Weak Crypto Needle in a Byte Haystack

Automatic detection of key-reuse vulnerabilities

Hack the (Gesundheits-)System, wenigstens 'n bisschen
61 min

Hack the (Gesundheits-)System, wenigstens 'n bisschen

Was deine Katze mit deinem Versicherungsbeitrag zu tun…

Financing The Revolution
69 min

Financing The Revolution

Secure, private value transactions using digital cash

Von Zensursula über Censilia hin zum Kindernet
60 min

Von Zensursula über Censilia hin zum Kindernet

Jahresrückblick rund um Internet-Sperren,…

Enabling Innovation in Europe
33 min

Enabling Innovation in Europe

Hacker Spaces, Startups, and a new approach to social…

Mobile phone call encryption
69 min

Mobile phone call encryption

Encrypting (GSM) mobile phone calls over VPN with an…

Hackerspaces
56 min

Hackerspaces

How we built ours - How you can build yours

Secure Code
57 min

Secure Code

Why developing Secure Software is like playing Marble…

muXTCP
50 min

muXTCP

Writing your own flexible Userland TCP/IP Stack - Ninja…