Search for "Steve"

Covert channels in TCP/IP: attack and defence
42 min

Covert channels in TCP/IP: attack and defence

Creation and detection of IP steganography for covert…

Detecting temperature through clock skew
62 min

Detecting temperature through clock skew

Hot or Not: Defeating anonymity by monitoring clock skew to…

The A5 Cracking Project
61 min

The A5 Cracking Project

Practical attacks on GSM using GNU Radio and FPGAs

Chip and PIN is Broken
57 min

Chip and PIN is Broken

Vulnerabilities in the EMV Protocol

Hartmut Esslinger
40 min

Hartmut Esslinger

Ein deutscher Designer gestaltet für Apple

Newton
50 min

Newton

Entwicklung und Technik des ersten PDA