Search for "Dan" returned 11019 results

Forging the USB armory
30 min

Forging the USB armory

Creating an open source secure flash-drive-sized computer

The rise and fall of Internet voting in Norway
60 min

The rise and fall of Internet voting in Norway

Evaluating a complex cryptographic implementation

"Exploit" in theater
64 min

"Exploit" in theater

post-existentialism is the question, not post-privacy

Finding the Weak Crypto Needle in a Byte Haystack
32 min

Finding the Weak Crypto Needle in a Byte Haystack

Automatic detection of key-reuse vulnerabilities

Living Drones
31 min

Living Drones

From war pigeons in 1914 to cyborg moths in 2014

The Matter of Heartbleed
50 min

The Matter of Heartbleed

What went wrong, how the Internet reacted, what we can…

Trustworthy secure modular operating system engineering
61 min

Trustworthy secure modular operating system engineering

fun(ctional) operating system and security protocol…

Krypto für die Zukunft
31 min

Krypto für die Zukunft

Verteidigung gegen Dunkle Künste

Snowden Effect vs. Privacy Paradox
34 min

Snowden Effect vs. Privacy Paradox

Einstellungen und Internetnutzungsverhalten im Kontext des…

NSA Points of Presence in AT
59 min

NSA Points of Presence in AT

Vortrag mit aktuellen Fotos aus luftigen Perspektiven

3D Casting Aluminum
55 min

3D Casting Aluminum

Too Much Fun with Microwaves

Correcting copywrongs
61 min

Correcting copywrongs

European copyright reform is finally on the horizon

ECCHacks
55 min

ECCHacks

A gentle introduction to elliptic-curve cryptography

Let's build a quantum computer!
59 min

Let's build a quantum computer!

Understanding the architecture of a quantum processor