Search for "jk" returned 2324 results

ZombieLoad Attack
55 min

ZombieLoad Attack

Leaking Your Recent Memory Operations on Intel CPUs

Quantum Cryptography
60 min

Quantum Cryptography

from key distribution to position-based cryptography

Damn Vulnerable Chemical Process
61 min

Damn Vulnerable Chemical Process

Exploitation in a new media

Briar
31 min

Briar

Resilient P2P Messaging for Everyone

Virtual Secure Boot
51 min

Virtual Secure Boot

Secure Boot support in qemu, kvm and ovmf.

Hacking EU funding for a decentralizing FOSS project
59 min

Hacking EU funding for a decentralizing FOSS project

Understanding and adapting EU legal guidelines from a FOSS…

Kryptographie nach Snowden
57 min

Kryptographie nach Snowden

Was tun nach der mittelmäßigen Kryptographie-Apokalypse?

Celeste
22 min

Celeste

Bringing an Indie Classic to Picosystem

Electromagnetic Threats for Information Security
49 min

Electromagnetic Threats for Information Security

Ways to Chaos in Digital and Analogue Electronics

Public Library/Memory of the World
62 min

Public Library/Memory of the World

Access to knowledge for every member of society

Numerical Air Quality Modeling Systems
61 min

Numerical Air Quality Modeling Systems

a journey from emissions to exposure