Search for person "Steven J. Murdoch"
next
57 min
Vulnerabilities in the EMV Protocol
45 min
Reverse-engineering currency detection systems
58 min
Tampering the Tamper-Proof
42 min
Creation and detection of IP steganography for covert…
62 min
Hot or Not: Defeating anonymity by monitoring clock skew to…
62 min
Keeping your enemies close
62 min
Sharing experience about campaigning on the political field…
59 min
Will the U.S. be ready for 2020?
next