Search for "sECuRE" returned 800 results

How Alice and Bob meet if they don't like onions
61 min

How Alice and Bob meet if they don't like onions

Survey of Network Anonymisation Techniques

Internet of Dongs
32 min

Internet of Dongs

A long way to a vibrant future

In Search of Evidence-Based IT-Security
30 min

In Search of Evidence-Based IT-Security

IT security is largely a science-free field. This needs to…

Chaospager
38 min

Chaospager

How to construct an Open Pager System for c3

Iridium Update
56 min

Iridium Update

more than just pagers

Thwarting Evil Maid Attacks
58 min

Thwarting Evil Maid Attacks

Physically Unclonable Functions for Hardware Tamper…

»Hard Drive Punch«
25 min

»Hard Drive Punch«

Destroying data as a performative act

Tractors, Rockets and the Internet in Belarus
43 min

Tractors, Rockets and the Internet in Belarus

How belarusian authoritarian regime is using technologies…

CPU Entwicklung in Factorio
38 min

CPU Entwicklung in Factorio

Vom D-Flip-Flop bis zum eigenen Betriebssystem

PUFs, protection, privacy, PRNGs
31 min

PUFs, protection, privacy, PRNGs

an overview of physically unclonable functions

BREACH in Agda
49 min

BREACH in Agda

Security notions, proofs and attacks using dependently…

Concepts for global TSCM
60 min

Concepts for global TSCM

getting out of surveillance state mode