Search for "Jim" returned 4890 results

Comparison of WAN IGP protocols
103 min

Comparison of WAN IGP protocols

RSTP+flooding/learning for Ethernet, OSPFv2 for IPv4, and…

The DROWN Attack
55 min

The DROWN Attack

Breaking TLS using SSLv2

Programming FPGAs with PSHDL
61 min

Programming FPGAs with PSHDL

Let's create the Arduino for FPGAs

Attacking end-to-end email encryption
60 min

Attacking end-to-end email encryption

Efail, other attacks and lessons learned.

Afroroutes: Africa Elsewhere
38 min

Afroroutes: Africa Elsewhere

VR experience "Beyond Slavery"

Data Mining for Good
26 min

Data Mining for Good

Using random sampling, entity resolution, communications…

Media Coverage and the Public in the Surveillance Society
60 min

Media Coverage and the Public in the Surveillance Society

Findings from a Research Project on Digital Surveillance…

Mr Beam goes Kickstarter
31 min

Mr Beam goes Kickstarter

Lessons learned from crowdfunding a hardware project

Speaking Fiction To Power
43 min

Speaking Fiction To Power

Strategies and tactics to ‘hack’ public spaces and social…

A Blockchain Picture Book
36 min

A Blockchain Picture Book

Blockchain origins and related buzzwords, described in…

Evolution of Brain-Computer Interfaces
35 min

Evolution of Brain-Computer Interfaces

The future of Neuro-Headsets and concepts towards…

Wind: Off-Grid Services for Everyday People
60 min

Wind: Off-Grid Services for Everyday People

Integrating nearby and offline connectivity with the…

Finding the Weak Crypto Needle in a Byte Haystack
32 min

Finding the Weak Crypto Needle in a Byte Haystack

Automatic detection of key-reuse vulnerabilities

Hacking EU funding for a decentralizing FOSS project
59 min

Hacking EU funding for a decentralizing FOSS project

Understanding and adapting EU legal guidelines from a FOSS…