Search for person "Roland van Rijswijk-Deij" returned 135 results

31 min
PUFs, protection, privacy, PRNGs
an overview of physically unclonable functions

42 min
A world without blockchain
How (inter)national money transfers works

23 min
OpenSource, OpenData und Citizen Science in der Biodiversitätsforschung
Wie Wissenschaft und Verwaltung von freiem Zugang und…

27 min
Detecting a breach from an attackers perspective.
We're gonna regret this

53 min
Smart, safe & happy
ensuring civil rights in the digital era

60 min
Flip Feng Shui
Advanced Rowhammer exploitation on cloud, desktop, and…

63 min
A look into the Mobile Messaging Black Box
A gentle introduction to mobile messaging and subsequent…

53 min
TBM: Trusted boot module
NLNet sponsored (open hardware) trusted boot module

60 min
Windows drivers attack surface
some 'new' insights

61 min
Avoiding kernel panic: Europe’s biggest fails in digital policy-making
How the institutions fuck up, and how we fuck it up as well

45 min
Time affects
Human-computer-synchronizations

58 min
Cyber all the Wassenaars
Export controls and exploit regulations: braindead and…

28 min
Long war tactics
or how we learned to stop worrying and love the NSA

29 min
Infocalypse now: P0wning stuff is not enough
Several failure modes of the hacker scene

61 min
X Security
It's worse than it looks

61 min
Now I sprinkle thee with crypto dust
Internet reengineering session

58 min
Setting mobile phones free
An overview of a mobile telephony market and how a…

55 min
Our daily job: hacking the law
The key elements of policy hacking

38 min