Search for "sECuRE"
prev
next
49 min
Be prepared for the coming Digital Winter. And play…
43 min
A hacker's view at commercial drone security
47 min
Obtaining the secret TETRA primitives after decades in the…
48 min
the superior Multi Factor Authentication Framework
32 min
How search and rescue in the mediterranean was criminalized
39 min
Decentralising the fight against automated surveillance in…
45 min
From Research over Vulnerability Discovery to Public…
50 min
An explanation of Inter-Net and everyday protocols
61 min
Techniques for Chip Preparation
56 min
How soft and hardware can play a key role in saving lives…
prev
next