Search for "Andi Rüther" returned 676 results

58 min
Self-encrypting deception
weaknesses in the encryption of solid state drives (SSDs)

62 min
Bionic Ears
Introduction into State-of-the-Art Hearing Aid Technology

62 min
To Protect And Infect, Part 2
The militarization of the Internet

62 min
Machine Dreams
Dreaming Machines

64 min
Source Code and Cross-Domain Authorship Attribution
The Role of Stylometry in Privacy

56 min
Viva la Vita Vida
Hacking the most secure handheld console

58 min
When hardware must „just work“
An inside look at x86 CPU design

61 min
X Security
It's worse than it looks

60 min
Low Cost High Speed Photography
Using microcontrollers to capture the blink of an eye for…

61 min
Deploying TLS 1.3: the great, the good and the bad
Improving the encrypted the web, one round-trip at a time

58 min
Script Your Car!
Using existing hardware platforms to integrate python into…

65 min
Rocket science – how hard can it be?
First steps into space with sounding rockets

62 min
Space Hacker
Uploading rover...

59 min