Search for "sECuRE"
prev
next
57 min
Was tun nach der mittelmäßigen Kryptographie-Apokalypse?
35 min
Introduction to IC reverse engineering for…
51 min
what is the EU up to now?
59 min
FPGAs for Everybody with Novena
60 min
How advanced threat actors learn and change with innovation…
36 min
Theresa May’s effort to abolish privacy
30 min
The Red Pill of N26 Security
63 min
how the EU was hypnotised that the NSA did not exist
63 min
How to understand this historic challenge and what we can…
43 min
How belarusian authoritarian regime is using technologies…
59 min
Understanding the architecture of a quantum processor
60 min
'Liberating' Firmware from Closed Devices with Open Source…
47 min
Applying science to eliminate 100% of buffer overflows
prev
next