Search for "sec" returned 2526 results

39 min
The Unfolding Space Glove
A Wearable for the Visually Impaired Translating 3D Vision…

103 min
Comparison of WAN IGP protocols
RSTP+flooding/learning for Ethernet, OSPFv2 for IPv4, and…

38 min
Afroroutes: Africa Elsewhere
VR experience "Beyond Slavery"

29 min
What de.fac2?
Attacking an opensource U2F device in 30 minutes or less

60 min
Quantum Cryptography
from key distribution to position-based cryptography

30 min
Forging the USB armory
Creating an open source secure flash-drive-sized computer

53 min
When algorithms fail in our personal lives
Social media break up coordinator

46 min
Free Software
Software Design For The Environment

56 min
Rock' em Graphic Cards
Introduction to Heterogeneous Parallel Programming

41 min
Extracting keys from FPGAs, OTP Tokens and Door Locks
Side-Channel (and other) Attacks in Practice

60 min
On the insecure nature of turbine control systems in power generation
A security study of turbine control systems in power…

61 min
Now I sprinkle thee with crypto dust
Internet reengineering session

58 min
When hardware must „just work“
An inside look at x86 CPU design

47 min
Finding Vulnerabilities in Internet-Connected Devices
A Beginner’s Guide

60 min