Search for "Sec" returned 2560 results

64 min
Decoding the LoRa PHY
Dissecting a Modern Wireless Network for the Internet of…

58 min
Operation Triangulation
What You Get When Attack iPhones of Researchers

47 min
Finding Vulnerabilities in Internet-Connected Devices
A Beginner’s Guide

58 min
Taming the Chaos: Can we build systems that actually work?
Possible paths from today's ghastly hackery to what…

103 min
Comparison of WAN IGP protocols
RSTP+flooding/learning for Ethernet, OSPFv2 for IPv4, and…

46 min
Writing secure software
using my blog as example

38 min
Gerechtigkeit 4.0
Makroökonomische Auswirkungen der Digitalisierung auf den…

37 min
Privacy by Design
Collecting data in a socially responsible manner without…

39 min
Fuzzing the TCP/IP stack
beyond the trivial

60 min
Everything you always wanted to know about Certificate Transparency
(but were afraid to ask)

60 min
Quantum Cryptography
from key distribution to position-based cryptography

53 min
When algorithms fail in our personal lives
Social media break up coordinator

42 min
Die Akte Xandr
Ein tiefer Blick in den Abgrund der Datenindustrie

59 min
The Ultimate SPC700 Talk
The hardware behind the music of Super Mario World, Chrono…

41 min