Information Security (34)
01:56:53
Cryptocurrencies and Blockchain Tech: Strengths, Weaknesses, Opportunities, Thre...
2018-11-12
·
1535 Views
01:30:35
Tehnologija veriženja blokov
2018-11-05
·
954 Views
49:12
Cyber-military capabilities of North Korea
2018-10-04
·
1567 Views
32:52
X3DH in Double Ratchet - vpogled v drobovje modernih šifrirnih algoritmov
2018-06-04
·
975 Views
01:03:49
Analiza zlonamerne programske opreme z obratnim inženirstvom
2018-04-12
·
1037 Views
04:22
DESTRIERO project with Elena Francioni
2016-01-13
·
1988 Views
17:06
Theme 4 Panel Questions and Answers
2015-12-01
·
1658 Views
04:39
Theme Introduction
2015-12-01
·
1120 Views
17:17
Theme Introduction
2015-12-01
·
1229 Views
17:20
“Cyber threats: hiding in plain sight”
2015-12-01
·
1279 Views
14:40
Cluster Projects I: SECTOR and DESTRIERO
2015-12-01
·
1170 Views
19:44
Proactive and reactive risk management
2015-12-01
·
1225 Views
37:12
Cluster Projects II: S-HELP and COBACORE
2015-12-01
·
1277 Views
21:55
Secure Architectures of Future Emerging Cryptography
2015-12-01
·
1252 Views
10:50
Theme 3 Panel Questions and Answers
2015-12-01
·
1295 Views
07:07
Theme Introduction
2015-12-01
·
1306 Views
08:17
Theme Introduction
2015-12-01
·
1442 Views
17:37
A European Commission Perspective
2015-12-01
·
1190 Views
14:04
Lessons Learned: Experiences in other Sectors
2015-12-01
·
1437 Views
03:18
Tom Flynn interview
2015-12-01
·
1500 Views
Page 1 of 2