Search for "ths" returned 8305 results

The rise and fall of Internet voting in Norway
60 min

The rise and fall of Internet voting in Norway

Evaluating a complex cryptographic implementation

Finding the Weak Crypto Needle in a Byte Haystack
32 min

Finding the Weak Crypto Needle in a Byte Haystack

Automatic detection of key-reuse vulnerabilities

Resisting Surveillance: it's is not just about the metadata
60 min

Resisting Surveillance: it's is not just about the metadata

The infiltration and physical surveillance of social…