Search for " Leo" returned 1768 results

BREACH in Agda
49 min

BREACH in Agda

Security notions, proofs and attacks using dependently…

The Snowden Refugees under Surveillance in Hong Kong
66 min

The Snowden Refugees under Surveillance in Hong Kong

A Rapidly Emerging Police State and Imminent Deportation to…

Open source experimental incubator build up
33 min

Open source experimental incubator build up

call for participation in project and product development

Why is GPG "damn near unusable"?
60 min

Why is GPG "damn near unusable"?

An overview of usable security research

ASLR on the line
44 min

ASLR on the line

Practical cache attacks on the MMU

Understanding millions of gates
35 min

Understanding millions of gates

Introduction to IC reverse engineering for…