Search for "sECuRE"
prev
next
55 min
A gentle introduction to elliptic-curve cryptography
36 min
Using TOR for securing Smart Homes from prying eyes
46 min
Chasing hackers with a bunch of monkeys
60 min
Attacks, Defences and Public Policy Issues...
100 min
And Other Approaches For The Strange Reality Of Web Defense
35 min
When your code must not fail
43 min
Building Modern Cryptography
59 min
Will the U.S. be ready for 2020?
60 min
what I found out using my home and body as a test lab
76 min
Breaking Remote Keyless Entry Systems with Power Analysis
52 min
hardware demo during the lecture
prev
next