Search for "Udo Vetter" returned 1133 results
58 min
Thwarting Evil Maid Attacks
Physically Unclonable Functions for Hardware Tamper…
61 min
Deploying TLS 1.3: the great, the good and the bad
Improving the encrypted the web, one round-trip at a time
33 min
Structuring open hardware projects
experiences from the “i3 Berlin” 3D printer project with…
58 min
RFID Treehouse of Horror
Hacking City-Wide Access Control Systems
40 min
Never Forgetti
a didactic live-gaming performance about dying women across…
58 min
CIA vs. Wikileaks
Intimiditation surveillance and other tactics observed and…
39 min
The automobile as massive data gathering source and the consequences for individual…
The next big privacy heist
50 min
The Matter of Heartbleed
What went wrong, how the Internet reacted, what we can…
55 min
Revisiting SSL/TLS Implementations
New Bleichenbacher Side Channels and Attacks
46 min
It's not safe on the streets... especially for your 3DS!
Exploring a new attack surface on the 3DS
36 min
Long Distance Quantum Communication
Concepts and components for intercontinal communication…
31 min
openPower - the current state of commercial openness in CPU development
is there no such thing as open hardware?
33 min
The Transhumanist Paradox
Deciding between technological utopias in a liberal state
32 min
library operating systems
reject the default reality^W abstractions and substitute…
62 min
HUMUS sapiens
Open Soil Research
57 min