Search for "Ute Holl"
prev
next
55 min
Uncovering and assessing a second authentication mechanism…
32 min
Augmenting the Human Mind
48 min
3 different RCE vulnerabilities on Ruckus Wireless access…
39 min
A parliamentary drama of 223 actors
26 min
The struggle for security for all.
42 min
How (inter)national money transfers works
46 min
Analyzing & Breaking Exploit Mitigations and Secure Random…
64 min
Free Software on Your Camera
54 min
Introduction to sex- and gender-sensitive medicine
66 min
Die Diskussion um NSA, PRISM, Tempora sprachlich und…
41 min
Schule schwänzen für das Klima
57 min
Eine kleine Einführung in den 802.11ac Standard
33 min
experiences from the “i3 Berlin” 3D printer project with…
44 min
“Eine neue Hoffnung” oder “Angriff der Klonkrieger”?
60 min
Living with a vulnerable implanted device
prev
next