Search for "sECuRE" returned 734 results

59 min
We should share our secrets
Shamir secret sharing: How it works and how to implement it

39 min
The automobile as massive data gathering source and the consequences for individual…
The next big privacy heist

51 min
Playing defence is complicated
What goes into playing defence and what can be holding you…

30 min
Biometrie ist cool (nicht nur Biometrie)
wer ist Dein Gegner?

47 min
Hardening hardware and choosing a #goodBIOS
Clean boot every boot - rejecting persistence of malicious…

61 min
Enclosure-PUF
Tamper Proofing Commodity Hardware and other Applications

51 min
SCADA and PLC Vulnerabilities in Correctional Facilities
Tiffany Rad, Teague Newman, John Strauchs

39 min