Search for person "Paul Wouters"
Secure, private value transactions using digital cash
Hacker Spaces, Startups, and a new approach to social…
Encrypting (GSM) mobile phone calls over VPN with an…
How we built ours - How you can build yours
Why developing Secure Software is like playing Marble…
Writing your own flexible Userland TCP/IP Stack - Ninja…