Search for "Jim" returned 4890 results

Wind: Off-Grid Services for Everyday People
60 min

Wind: Off-Grid Services for Everyday People

Integrating nearby and offline connectivity with the…

Finding the Weak Crypto Needle in a Byte Haystack
32 min

Finding the Weak Crypto Needle in a Byte Haystack

Automatic detection of key-reuse vulnerabilities

Hacking EU funding for a decentralizing FOSS project
59 min

Hacking EU funding for a decentralizing FOSS project

Understanding and adapting EU legal guidelines from a FOSS…

The Internet (Doesn't) Need Another Security Guide
62 min

The Internet (Doesn't) Need Another Security Guide

Creating Internet Privacy and Security Resources That Don't…

Toward a Cognitive "Quantified Self"
49 min

Toward a Cognitive "Quantified Self"

Activity Recognition for the Mind

Lightning Talks II
31 min

Lightning Talks II

DeepVGI - Einsatz von Lowcost-Lidarsystemen für die…

Inside the AMD Microcode ROM
37 min

Inside the AMD Microcode ROM

(Ab)Using AMD Microcode for fun and security

Fuck Dutch mass-surveillance: let's have a referendum!
32 min

Fuck Dutch mass-surveillance: let's have a referendum!

Forcing the Netherlands to publicly debate privacy and the…

Syrian Archive
30 min

Syrian Archive

Preserving documentation of human rights violations

ASLR on the line
44 min

ASLR on the line

Practical cache attacks on the MMU

Designing PCBs with code
21 min

Designing PCBs with code

Is designing circuits with code instead of CAD the future…

Hacking the Nintendo Game & Watch
42 min

Hacking the Nintendo Game & Watch

Your princess is AES encrypted in another castle

Keys of Fury
25 min

Keys of Fury

Type In Beyond the Scrolling Horizon

Trustworthy secure modular operating system engineering
61 min

Trustworthy secure modular operating system engineering

fun(ctional) operating system and security protocol…

The Magic World of Searchable Symmetric Encryption
58 min

The Magic World of Searchable Symmetric Encryption

A brief introduction to search over encrypted data