Search for "Sven" returned 2150 results
30 min
Shut Up and Take My Money!
The Red Pill of N26 Security
39 min
Why to log centrally?
And how is it changing?
42 min
Covert channels in TCP/IP: attack and defence
Creation and detection of IP steganography for covert…
29 min
Building and Breaking Wireless Security
Wireless Physical Layer Security & More...
61 min
Copywrongs 2.0
We must prevent EU copyright reform from breaking the…
56 min
Protesting in the new Millenium
The Use of Electronic Communications to Protest
51 min
Talking people into creating patches
... and submitting them ...
56 min