Parent directory/ | - | - |
An infestation of dragons Exploring vulnerabilities in ... (by Josh Thomas and Charles Holmes).mp4 | 50.9 MiB | 2021 May 02 22:09 |
An infestation of dragons Exploring vulnerabilities in ... (by Josh Thomas and Charles Holmes).srt | 48.2 KiB | 2019 Sep 30 19:53 |
Android and trusted execution environments (by Jan-Erik Ekberg).mp4 | 31.6 MiB | 2021 May 02 22:09 |
Android security architecture (by Nikolay Elenkov).mp4 | 47.6 MiB | 2021 May 02 22:09 |
Android security architecture (by Nikolay Elenkov).srt | 124.6 KiB | 2019 Sep 30 19:53 |
Assessing Android applications using command-line fu (by Pau Oliva Fora).mp4 | 40.8 MiB | 2021 May 02 22:09 |
Continuous risk-aware multi-modal authentication (by Rainhard D. Findling and Muhammad Muaaz).mp4 | 19.5 MiB | 2021 May 02 22:09 |
Continuous risk-aware multi-modal authentication (by Rainhard D. Findling and Muhammad Muaaz).srt | 25.7 KiB | 2019 Sep 30 19:53 |
Exploit mitigation at the native level for RISC-based devices (by Matthias Neugschwandtner).mp4 | 47.5 MiB | 2021 May 02 22:09 |
Exploit mitigation at the native level for RISC-based devices (by Matthias Neugschwandtner).srt | 43.9 KiB | 2019 Sep 30 19:53 |
How Google killed two-factor authentication (by Victor van der Veen).mp4 | 35.1 MiB | 2021 May 02 22:09 |
How Google killed two-factor authentication (by Victor van der Veen).srt | 48.3 KiB | 2019 Sep 30 19:53 |
Human factors in anonymous mobile communication (by Svenja Schröder).mp4 | 17.7 MiB | 2021 May 02 22:09 |
Human factors in anonymous mobile communication (by Svenja Schröder).srt | 23.2 KiB | 2019 Sep 30 19:53 |
Improving mobile security with forensics, app analysis and big data (by Andrew Hoog).mp4 | 60.1 MiB | 2021 May 02 22:09 |
Improving mobile security with forensics, app analysis and big data (by Andrew Hoog).srt | 155.9 KiB | 2019 Sep 30 19:53 |
Lessons from the trenches An inside look at Android security (by Nick Kralevich).mp4 | 48.7 MiB | 2021 May 02 22:09 |
Lessons from the trenches An inside look at Android security (by Nick Kralevich).srt | 53.1 KiB | 2019 Sep 30 19:53 |
Mobile threats incident handling (by Yonas Leguesse).mp4 | 35.3 MiB | 2021 May 02 22:09 |
Mobile threats incident handling (by Yonas Leguesse).srt | 54.7 KiB | 2019 Sep 30 19:53 |
Secure copy protection for mobile apps (by Nils T. Kannengiesser) - YouTube.mp4 | 23.3 MiB | 2021 May 02 22:09 |
Secure copy protection for mobile apps (by Nils T. Kannengiesser) - YouTube.srt | 28.0 KiB | 2019 Sep 30 19:53 |
Secure elements for you and me A model for programmable secure ... (by Alexandra Dmitrienko).mp4 | 26.0 MiB | 2021 May 02 22:09 |
The quest for usable security (by N. Asokan).mp4 | 50.2 MiB | 2021 May 02 22:09 |