Search for "xif" returned 1978 results

29 min
Heartache and Heartbleed: The insider’s perspective on the aftermath of Heartbleed
The untold story of what really happened, how it was…

32 min
Finding the Weak Crypto Needle in a Byte Haystack
Automatic detection of key-reuse vulnerabilities

30 min
In Search of Evidence-Based IT-Security
IT security is largely a science-free field. This needs to…

56 min
Reality Check! Basel/Lagos?? In virtual reality?
An African tale of art, culture and technology

59 min
Memory Deduplication: The Curse that Keeps on Giving
A tale of 3 different memory deduplication based…

37 min
The foodsaving grassroots movement
How cooperative online structures can facilitate…

58 min
Script Your Car!
Using existing hardware platforms to integrate python into…

60 min
Concepts for global TSCM
getting out of surveillance state mode

41 min
NGI Zero: A treasure trove of IT innovation
Resilient. Trustworthy. Sustainably Open.

32 min
Technology and Mass Atrocity Prevention
Overview on Current Efforts - We Need Moar H4x0rs?!

59 min
Pointing Fingers at 'The Media'
The Bundestagswahl 2017 and Rise of the AfD

31 min
Make the Internet Neutral Again
Let's put the new EU Net Neutrality rules to work

32 min
Modern key distribution with ClaimChain
A decentralized Public Key Infrastructure that supports…

36 min
Accessible input for readers, coders, and hackers
From eyelid blinks to speech recognition

58 min
Baseband Exploitation in 2013
Hexagon challenges

31 min
The Economic Consequences of Internet Censorship
Why Censorship is a Bad Idea for Everyone

59 min