Search for "mel" returned 2536 results
49 min
Electromagnetic Threats for Information Security
Ways to Chaos in Digital and Analogue Electronics
60 min
Open Source is Insufficient to Solve Trust Problems in Hardware
How Betrusted Aims to Close the Hardware TOCTOU Gap
55 min
Attribution revolution
Turning copyright upside-down with metadata
30 min
The Magical Secrecy Tour
A Bus Trip into the Surveillance Culture of Berlin One Year…
39 min
Web-based Cryptojacking in the Wild
When your browser is mining coins for other people
37 min
Information Biology - Investigating the information flow in living systems
From cells to dynamic models of biochemical pathways and …
49 min
Dissecting VoLTE
Exploiting Free Data Channels and Security Problems
55 min
SigOver + alpha
Signal overshadowing attack on LTE and its applications
39 min
Transmission Control Protocol
TCP/IP basics
46 min
What The Fax?!
Hacking your network likes it's 1980 again
60 min
From Computation to Consciousness
How computation helps to explain mind, universe and…
39 min
The automobile as massive data gathering source and the consequences for individual…
The next big privacy heist
58 min
Protecting Your Privacy at the Border
Traveling with Digital Devices in the Golden Age of…
53 min