Search for "anna" returned 407 results

53 min
Cryptography demystified
An introduction without maths

62 min
Kyber and Post-Quantum Crypto
How does it work?

42 min
We do Privacy by Design
Best practices and real-life examples

65 min
The exhaust emissions scandal („Dieselgate“)
Take a deep breath into pollution trickery

58 min
PLC-Blaster
Ein Computerwurm für PLCs

32 min
The Case for Scale in Cyber Security
Security Track Keynote

37 min
Hacking (with) a TPM
Don't ask what you can do for TPMs, Ask what TPMs can do…

72 min
State of the Onion
Neuland

58 min
Uncertain Concern
How Undocumented Immigrants in the US Navigate Technology

44 min
Exploiting PHP7 unserialize
teaching a new dog old tricks

61 min
About Gamma-Ray Bursts And Boats
What We (Don't) Know About the Most Energetic Events in the…

60 min
the possibility of an army
phone verified accounts bringing the Hessian army back to…

60 min
Mein Bot, der Kombattant
Operative Kommunikation im digitalen Informationskrieg

60 min
Why is GPG "damn near unusable"?
An overview of usable security research

60 min
Unpatchable
Living with a vulnerable implanted device

31 min
Lightning Talks II
DeepVGI - Einsatz von Lowcost-Lidarsystemen für die…

61 min
Grow your own planet
How simulations help us understand the Universe

56 min