Search for "Lea Rain" returned 1099 results

45 min
Triggering Deep Vulnerabilities Using Symbolic Execution
Deep program analysis without the headache

61 min
Deploying TLS 1.3: the great, the good and the bad
Improving the encrypted the web, one round-trip at a time

60 min
My Robot Will Crush You With Its Soft Delicate Hands!
How to design and fabricate soft robots using everyday…

31 min
Demystifying Network Cards
Things you always wanted to know about NIC drivers

60 min
Ein Abgrund von Landesverrat
Wie es dazu kam und was daraus zu lernen ist

69 min
cryptocurrencies, smart contracts, etc.: revolutionary tech?
short answer: Yes!

30 min
On Computing Numbers, with an Application to Problems of our Society
Journalism ♥ Computer Science

55 min
How to Build a Mind
Artificial Intelligence Reloaded

61 min
Damn Vulnerable Chemical Process
Exploitation in a new media

62 min
Kyber and Post-Quantum Crypto
How does it work?

61 min
X Security
It's worse than it looks

60 min
osmo-gmr: What's up with sat-phones ?
Piecing together the missing bits

55 min
Cyber Necromancy
Reverse Engineering Dead Protocols

58 min