Search for "Naman Jain" returned 113 results

60 min
Lockpicking in the IoT
...or why adding BTLE to a device sometimes isn't smart at…

63 min
All cops are broadcasting
TETRA unlocked after decades in the shadows

32 min
Finding the Weak Crypto Needle in a Byte Haystack
Automatic detection of key-reuse vulnerabilities

60 min
Check your privileges!
How to drop more of your privileges to reduce attack…

61 min
Email authentication for penetration testers
When SPF is not enough

58 min
Angry weather ?
How human-induced climate change affects weather (& how we…

37 min
Hacking (with) a TPM
Don't ask what you can do for TPMs, Ask what TPMs can do…

53 min
Cryptography demystified
An introduction without maths

32 min
The Case for Scale in Cyber Security
Security Track Keynote

62 min
Kyber and Post-Quantum Crypto
How does it work?

60 min
Ein Abgrund von Landesverrat
Wie es dazu kam und was daraus zu lernen ist

44 min
What the cyberoptimists got wrong - and what to do about it
Tech unexeptionalism and the monopolization of every…

61 min