Search for person "Walter van Holst"
prev
next
53 min
An analysis of targeted attacks from 2005 to 2007
58 min
An overview of a mobile telephony market and how a…
42 min
How (inter)national money transfers works
31 min
an overview of physically unclonable functions
43 min
How to Stop the Dubious Use of Passenger Name Records by…
28 min
or how we learned to stop worrying and love the NSA
44 min
Documenting digital culture through handwritten letters
prev
next