Search for "Kay" returned 3588 results

59 min
We should share our secrets
Shamir secret sharing: How it works and how to implement it

31 min
The DRM Of Pacman
Copy protection schemes of way back then and how they…

29 min
SHA2017 Closing
Five days of hacking, this is what happened. You wouldn't…

59 min
Micro Services
Vertical thinking for a simple architecture!

54 min
Hacking Cisco Phones
Just because you are paranoid doesn't mean your phone isn't…

26 min
Learning from embedded: less is more
...or how to use any existing SUSE OS variant to meet all…

55 min
White-Box Cryptography
Survey

49 min
MISP threat sharing platform
The MISP threat sharing platform is a free and open source…

52 min
Privacy Design Strategies
Doing well is good enough

55 min