Search for "wsa" returned 5281 results

How medicine discovered sex
54 min

How medicine discovered sex

Introduction to sex- and gender-sensitive medicine

CIA vs. Wikileaks
58 min

CIA vs. Wikileaks

Intimiditation surveillance and other tactics observed and…

Waldfunk
40 min

Waldfunk

Mehr als nur eine SSID am Dannenröder Forst

Methodisch inkorrekt!
115 min

Methodisch inkorrekt!

Die Wissenschaftsgala vom 34C3

Ethics in the data society
35 min

Ethics in the data society

Power and politics in the development of the driverless car

Long Distance Quantum Communication
36 min

Long Distance Quantum Communication

Concepts and components for intercontinal communication…

TrustZone is not enough
31 min

TrustZone is not enough

Hijacking debug components for embedded security

Triggering Deep Vulnerabilities Using Symbolic Execution
45 min

Triggering Deep Vulnerabilities Using Symbolic Execution

Deep program analysis without the headache

Beyond Virtual and Augmented Reality
33 min

Beyond Virtual and Augmented Reality

From Superhuman Sports to Amplifying Human Senses

SCADA StrangeLove 2
41 min

SCADA StrangeLove 2

We already know

Key-logger, Video, Mouse
49 min

Key-logger, Video, Mouse

How to turn your KVM into a raging key-logging monster

The Zcash anonymous cryptocurrency
31 min

The Zcash anonymous cryptocurrency

or zero-knowledge succinct non-interactive arguments of…

Simulating the future of the global agro-food system
35 min

Simulating the future of the global agro-food system

Cybernetic models analyze scenarios of interactions between…

ASLR on the line
44 min

ASLR on the line

Practical cache attacks on the MMU

Shopshifting
60 min

Shopshifting

The potential for payment system abuse

Disclosure DOs, Disclosure DON'Ts
44 min

Disclosure DOs, Disclosure DON'Ts

Pragmatic Advice for Security Researchers