Search for "ALX" returned 5874 results

The Magic World of Searchable Symmetric Encryption
58 min

The Magic World of Searchable Symmetric Encryption

A brief introduction to search over encrypted data

Attacking end-to-end email encryption
60 min

Attacking end-to-end email encryption

Efail, other attacks and lessons learned.

Internet Cube
60 min

Internet Cube

Let's Build together a Free, Neutral and Decentralized…

Long war tactics
28 min

Long war tactics

or how we learned to stop worrying and love the NSA

De-anonymizing Programmers
59 min

De-anonymizing Programmers

Large Scale Authorship Attribution from Executable Binaries…

Why is GPG "damn near unusable"?
60 min

Why is GPG "damn near unusable"?

An overview of usable security research

The Fight for Encryption in 2016
60 min

The Fight for Encryption in 2016

Crypto fight in the Wake of Apple v. FBI

Vor Windows 8 wird gewarnt
60 min

Vor Windows 8 wird gewarnt

Und nichts (Secure) Bootet mehr?

apertus° AXIOM
30 min

apertus° AXIOM

The first Open Source Cinema Camera

Doping your Fitbit
22 min

Doping your Fitbit

On Fitbit Firmware Modifications and Data Extraction

Trügerische Sicherheit
61 min

Trügerische Sicherheit

Wie die Überwachung unsere Sicherheit gefährdet

In Search of Evidence-Based IT-Security
30 min

In Search of Evidence-Based IT-Security

IT security is largely a science-free field. This needs to…

Rowhammer.js: Root privileges for web apps?
30 min

Rowhammer.js: Root privileges for web apps?

A tale of fault attacks on DRAM and attacks on CPU caches

Interplanetary Colonization
33 min

Interplanetary Colonization

the state at the beginning of the 21st Century

This is NOT a proposal about mass surveillance!
43 min

This is NOT a proposal about mass surveillance!

Analysing the terminology of the UK’s Snooper’s Charter