Search for "Jong-Hoon Lee" returned 553 results
60 min
Shopshifting
The potential for payment system abuse
58 min
Glitching For n00bs
A Journey to Coax Out Chips' Inner Secrets
58 min
07KINGSTON25 JAMAICA: MALARIA UPDATE Dispatches from Fort Meade
Reporting on the secret trial of Chelsea Manning
61 min
CAESAR and NORX
Developing the Future of Authenticated Encryption
58 min
Thwarting Evil Maid Attacks
Physically Unclonable Functions for Hardware Tamper…
42 min
A world without blockchain
How (inter)national money transfers works
38 min
A deep dive into the world of DOS viruses
Explaining in detail just how those little COM files…
61 min
How Alice and Bob meet if they don't like onions
Survey of Network Anonymisation Techniques
42 min
Firmware Fat Camp
Embedded Security Using Binary Autotomy
47 min
Tightening the Net in Iran
The Situation of Censorship and Surveillance in Iran, and…
63 min
The Cloud Conspiracy 2008-2014
how the EU was hypnotised that the NSA did not exist
58 min
The Magic World of Searchable Symmetric Encryption
A brief introduction to search over encrypted data
41 min
Extracting keys from FPGAs, OTP Tokens and Door Locks
Side-Channel (and other) Attacks in Practice
55 min
Graphs, Drones & Phones
The role of social-graphs for Drones in the War on Terror.
61 min
Deploying TLS 1.3: the great, the good and the bad
Improving the encrypted the web, one round-trip at a time
60 min