Parent directory/ | - | - |
34c3-8735-spy_vs_spy_a_modern_study_of_microphone_bugs_operation_and_detection.pdf | 7.6 MiB | 2018-Jan-08 18:56 |
34c3-8741-treibhausgasemissionen_einschatzen.pdf | 6.3 MiB | 2018-Jan-08 19:04 |
34c3-8782-intel_me_myths_and_reality.pdf | 2.8 MiB | 2018-Jan-08 18:54 |
34c3-8789-lets_break_modern_binary_code_obfuscation.pdf | 1.9 MiB | 2018-Jan-08 18:52 |
34c3-8806-the_seizure_of_the_iuventa.pdf | 18.0 MiB | 2018-Jan-08 18:55 |
34c3-8811-beeinflussung_durch_kunstliche_intelligenz.pdf | 14.4 MiB | 2018-Jan-08 18:53 |
34c3-8831-trustzone_is_not_enough.pdf | 4.5 MiB | 2018-Jan-08 19:04 |
34c3-8853-international_image_interoperability_framework_iiif_kulturinstitutionen_schaffen_interoperable_schnittstellen_fur_digitalisiertes_kulturgut.pdf | 12.1 MiB | 2018-Jan-08 19:06 |
34c3-8865-digitale_bildung_in_der_schule.pdf | 5.5 MiB | 2018-Jan-08 19:00 |
34c3-8885-we_should_share_our_secrets.pdf | 1.8 MiB | 2018-Jan-08 19:00 |
34c3-8908-doping_your_fitbit.pdf | 1.0 MiB | 2018-Jan-08 18:51 |
34c3-8911-34c3_infrastructure_review.pdf | 20.2 MiB | 2018-Jan-08 19:06 |
34c3-8915-how_can_you_trust_formally_verified_software.pdf | 6.0 MiB | 2018-Jan-08 18:51 |
34c3-8935-simulating_the_future_of_the_global_agro-food_system.pdf | 12.3 MiB | 2018-Jan-08 19:03 |
34c3-8938-home_distilling.pdf | 11.2 MiB | 2018-Jan-08 19:00 |
34c3-8955-all_computers_are_beschlagnahmt.pdf | 7.4 MiB | 2018-Jan-08 18:55 |
34c3-8961-0en_1en_auf_dem_acker.pdf | 27.7 MiB | 2018-Jan-08 19:05 |
34c3-8964-watching_the_changing_earth.pdf | 36.2 KiB | 2018-Jan-08 18:51 |
34c3-8974-practical_mix_network_design.pdf | 6.3 MiB | 2018-Jan-08 18:52 |
34c3-8994-vintage_computing_for_trusted_radiation_measurements_and_a_world_free_of_nuclear_weapons.pdf | 16.4 MiB | 2018-Jan-08 19:02 |
34c3-9006-implementing_an_llvm_based_dynamic_binary_instrumentation_framework.pdf | 3.1 MiB | 2018-Jan-08 19:01 |
34c3-9021-squeezing_a_key_through_a_carry_bit.pdf | 5.6 MiB | 2018-Jan-08 18:52 |
34c3-9028-internet_censorship_in_the_catalan_referendum.pdf | 6.3 MiB | 2018-Jan-08 19:04 |
34c3-9029-uncovering_vulnerabilities_in_hoermann_bisecur.pdf | 3.2 MiB | 2018-Jan-08 19:00 |
34c3-9044-growing_up_software_development.pdf | 18.2 MiB | 2018-Jan-08 19:01 |
34c3-9055-science_is_broken.pdf | 2.2 MiB | 2018-Jan-08 18:51 |
34c3-9058-everything_you_want_to_know_about_x86_microcode_but_might_have_been_afraid_to_ask.pdf | 38.3 MiB | 2018-Jan-08 18:54 |
34c3-9072-bgp_and_the_rule_of_custom.pdf | 2.0 MiB | 2018-Jan-08 18:52 |
34c3-9094-modern_key_distribution_with_claimchain.pdf | 1.4 MiB | 2018-Jan-08 19:06 |
34c3-9106-pointing_fingers_at_the_media.pdf | 1.9 MiB | 2018-Jan-08 18:51 |
34c3-9111-public_fpga_based_dma_attacking.pdf | 2.4 MiB | 2018-Jan-08 19:04 |
34c3-9135-aslr_on_the_line.pdf | 2.2 MiB | 2018-Jan-08 19:00 |
34c3-9147-unleash_your_smart-home_devices_vacuum_cleaning_robot_hacking.pdf | 2.9 MiB | 2018-Jan-08 18:51 |
34c3-9148-italy_s_surveillance_toolbox.pdf | 3.6 MiB | 2018-Jan-08 19:07 |
34c3-9150-robot_music.pdf | 16.3 MiB | 2018-Jan-08 19:02 |
34c3-9159-demystifying_network_cards.pdf | 933.7 KiB | 2018-Jan-08 18:51 |
34c3-9176-this_is_not_a_proposal_about_mass_surveillance.pdf | 3.7 MiB | 2018-Jan-08 19:02 |
34c3-9178-on_the_prospects_and_challenges_of_weather_and_climate_modeling_at_convection-resolving_resolution.pdf | 3.1 MiB | 2018-Jan-08 19:03 |
34c3-9184-a_hacker_s_guide_to_climate_change_-_what_do_we_know_and_how_do_we_know_it.pdf | 28.8 MiB | 2018-Jan-08 19:03 |
34c3-9193-internet_of_fails.pdf | 19.4 MiB | 2018-Jan-08 18:57 |
34c3-9195-avatar.pdf | 604.2 KiB | 2018-Jan-08 19:04 |
34c3-9207-opening_closed_systems_with_glitchkit.pdf | 39.2 MiB | 2018-Jan-08 18:59 |
34c3-9222-the_noise_protocol_framework.pdf | 169.1 KiB | 2018-Jan-08 19:01 |
34c3-9273-kracking_wpa2_by_forcing_nonce_reuse.pdf | 2.1 MiB | 2018-Jan-08 18:51 |
34c3-9275-afro_tech.pdf | 5.7 MiB | 2018-Jan-08 19:01 |
34c3-9290-visceral_systems.pdf | 2.7 MiB | 2018-Jan-08 19:00 |