Search for "York University" returned 409 results
61 min
Damn Vulnerable Chemical Process
Exploitation in a new media
63 min
Analyze the Facebook algorithm and reclaim data sovereignty
Algorithms define your priorities. Who else besides you can…
58 min
Self-encrypting deception
weaknesses in the encryption of solid state drives (SSDs)
65 min
LatticeHacks
Fun with lattices in cryptography and cryptanalysis
66 min