Search for "Ute Holl" returned 1363 results

Cyber all the Wassenaars
58 min

Cyber all the Wassenaars

Export controls and exploit regulations: braindead and…

The Gospel of IRMA
55 min

The Gospel of IRMA

Attribute Based Credentials in Practice

The Global Assassination Grid
63 min

The Global Assassination Grid

The Infrastructure and People behind Drone Killings

Corporate surveillance, digital tracking, big data & privacy
62 min

Corporate surveillance, digital tracking, big data & privacy

How thousands of companies are profiling, categorizing,…

Finding the Weak Crypto Needle in a Byte Haystack
32 min

Finding the Weak Crypto Needle in a Byte Haystack

Automatic detection of key-reuse vulnerabilities

Attribution revolution
55 min

Attribution revolution

Turning copyright upside-down with metadata

Glitching For n00bs
58 min

Glitching For n00bs

A Journey to Coax Out Chips' Inner Secrets

Trustworthy secure modular operating system engineering
61 min

Trustworthy secure modular operating system engineering

fun(ctional) operating system and security protocol…