Peter Gutmann [Speaker-Timeline] [Speaker-Links]

Tell us about missing data
Title Conference Tags
Radiation-induced cryptographic failures and how to defend against them Kiwicon-2016 - wellington,new zealand
Cyberwar before there was Cyber: Hacking WWII Electronic Bomb Fuses Kiwicon-2014 - wellington,New zealand
Plenary- Crypto Won't Save You Either AusCERT-2014 - Gold Coast,Austrailia
From Revenue Assurance to Assurance: The Importance of Measurement in Computer Security Kiwicon-2012 - Wellington, New Zealand Security
Three Guys With Ponytails Talk About Security Kiwicon-2012 - Wellington, New Zealand
From Revenue Assurance to Assurance: The Importance of Measurement in Computer Security 8th International Workshop on Security Measurements and Metrics (MetriSec)-2012 - Lund, Sweden Security
Panel: Data Sources and How Much to Trust Them 8th International Workshop on Security Measurements and Metrics (MetriSec)-2012 - Lund, Sweden
Contactless Payment Systems: Credit Cards and NFC Phones AusCERT-2012 - Gold Coast, Austrailia Security
Keynote Address: ShmooCon-2012 - Washington DC, USA Security
An Embarassingly Simple Approach to Securing Browser Users KiwiCon-2011 - Wellington, New Zealand Security
PKI, Lemon Markets and Lemonade RSA-2011 - N.A,US
Unsolvable Problems In Computer Security KiwiCon-2010 - Wellington, New Zealand Security Others
Some Thoughts On Threat Modelling KiwiCon-2009 - Wellington, New Zealand Security
The Psychology Of Security Unusability DEF CON-17 - Las Vegas, USA Security
Oops - Defending where the Enemy Isn't AUScert-2009 - Gold Coast, Australia
E&T panel AUScert-2009 - Gold Coast, Australia
Why Biometrics Is Not A Panacea: A Comedy Of Errors In Three Parts KiwiCon-2008 - Wellington, New Zealand Security
Privacy, the Law and Information Security AUScert-2008 - Gold Coast, Australia
Things That Make Us Dumb: Why Security User Interfaces lead to Insecure User Actions AUScert-2008 - Gold Coast, Australia
Bugs In The Wetware: The Psychology Of Computer Insecurity KiwiCon-2007 - Wellington, New Zealand Security
Windows Vista Content Protection 16th USENIX Security Symposium-2007 - Boston, USA Security
The Commercial Malware Industry DEF CON-15 - Las Vegas, USA Security Malware
Phishing Tips And Techniques: Tackle, Rigging, And How &Amp; When To Phish DEF CON-14 - Las Vegas, USA Security Phishing
Plug-And-Play Pki: A Pki Your Mother Can Use 12th USENIX Security Symposium-2003 - Washington DC, USA Security
Application-Level Security Protocols: Pgp, S/Mime, Ssl, And Ssh 12th USENIX Security Symposium-2003 - Washington DC, USA Security
Graphic Of Archaeologists Looking At Ancient Scrollslessons Learned In Implementing And Deploying Crypto Software 11th USENIX Security Symposium-2002 - San Francisco, USA Security
Data Remanence In Semiconductor Devices 10th USENIX Security Symposium-2001 - Washington DC, USA Security Hardware General Forensics
Key Management 10th USENIX Security Symposium-2001 - Washington DC, USA Security
An Open-Source Cryptographic Coprocessor 9th USENIX Security Symposium-2000 - Denver, USA Security
The Design Of A Cryptographic Security Architecture 8th USENIX Security Symposium-1999 - Washington DC, USA Security
Software Generation Of Practically Strong Random Numbers 7th USENIX Security Symposium-1998 - San Antonio, USA Security
Secure Deletion Of Data From Magnetic And Solid-State Memory 6th USENIX Security Symposium-1996 - San Jose, USA Security