YoVDO

Computer Security Courses

Computer Security and the Internet of Things - Risks and Challenges
USENIX Enigma Conference via YouTube
A Million Hit Points and Infinite Charisma - How Games Can Fix Computer Security Education
USENIX Enigma Conference via YouTube
Pwning ARM Debug Components
Hack In The Box Security Conference via YouTube
Make Sure DSA Signing Exponentiations Really Are Constant-Time
Association for Computing Machinery (ACM) via YouTube
High-Throughput Semi-Honest Secure Three-Party Computation with an Honest Majority
Association for Computing Machinery (ACM) via YouTube
BeleniosRF - A Non-Interactive Receipt-Free Electronic Voting Scheme
Association for Computing Machinery (ACM) via YouTube
Attribute-based Key Exchange with General Policies
Association for Computing Machinery (ACM) via YouTube
What Else is Revealed by Order Revealing Encryption?
Association for Computing Machinery (ACM) via YouTube
MEMS Gyroscopes as Physical Unclonable Functions
Association for Computing Machinery (ACM) via YouTube
Computational Soundness for Dalvik Bytecode
Association for Computing Machinery (ACM) via YouTube
< Prev Page 11 Next >