Search for "Kay" returned 3844 results
54 min
Hacking Cisco Phones
Just because you are paranoid doesn't mean your phone isn't…
59 min
We should share our secrets
Shamir secret sharing: How it works and how to implement it
29 min
SHA2017 Closing
Five days of hacking, this is what happened. You wouldn't…
59 min
Micro Services
Vertical thinking for a simple architecture!
55 min
A Probabilistic Trust Model for GnuPG
A new way of evaluating a PGP web of trust by using a…
55 min
White-Box Cryptography
Survey
46 min
Proof by Erasure
The Life of John von Neumann
47 min
Kurt Gödel – I do not fit into this century
Ein audiovisuelles Live-Feature
26 min
Learning from embedded: less is more
...or how to use any existing SUSE OS variant to meet all…
49 min