Search for person "David Croft et al"
prev
next
34 min
Extending capability-based security models to achieve…
30 min
Preserving documentation of human rights violations
36 min
From eyelid blinks to speech recognition
98 min
Essential Tips and Tricks
58 min
How did GCHQ do it to the Guardian's copy of Snowden's…
61 min
fun(ctional) operating system and security protocol…
46 min
Strong metadata protection for asynchronous messaging
prev
next