Search for "Sec" returned 2536 results

60 min
Sneaking In Network Security
Enforcing strong network segmentation, without anyone…

41 min
NGI Zero: A treasure trove of IT innovation
Resilient. Trustworthy. Sustainably Open.

36 min
A Blockchain Picture Book
Blockchain origins and related buzzwords, described in…

60 min
Quantum Cryptography
from key distribution to position-based cryptography

37 min
Music on Mars?
A Musical Adventure for Astronauts and the Space Cadets Who…

49 min
SD-WAN a New Hop
How to hack software defined network and keep your sanity?

61 min
AlphaFold – how machine learning changed structural biology forever (or not?)
Getting first-hand insights into the impact of machine…

41 min
Extracting keys from FPGAs, OTP Tokens and Door Locks
Side-Channel (and other) Attacks in Practice

21 min
Bootloader Crimes
Building disposable Windows VMs

39 min
Bits and Bytes in Microgravity
Insights into the hardware and software of sounding rockets

51 min
Virtual Secure Boot
Secure Boot support in qemu, kvm and ovmf.

29 min
What de.fac2?
Attacking an opensource U2F device in 30 minutes or less

49 min
Creating Resilient and Sustainable Mobile Phones
Be prepared for the coming Digital Winter. And play…

58 min
When hardware must „just work“
An inside look at x86 CPU design

64 min