ConCollector
our blog
|
more on thinkst
Search:
Everything
Browse:
Speakers
Conferences
Topics
Contributors
Analytics
Folklore
About
Login
Tom Ritter
[Speaker-Timeline]
[Speaker-Links]
Tell us about missing data
Title
Conference
Tags
I Can Hear You Now: Traffic Interception and Remote Mobile Phone Cloning with a Compromised CDMA Femtocell
DEFCON-2013 - Las Vegas,Nevada
De-Anonymizing Alt.Anonymous.Messages
DEFCON-2013 - Las Vegas,Nevada
The Factoring Dead: Preparing for the Cryptopocalypse
BlackHatUSA-2013 - Las Vegas,USA
I Can Hear You Now: Traffic Interception and Remote Mobile Phone Cloning with a Compromised CDMA Femtocell
BlackHatUSA-2013 - Las Vegas,USA
THE MYTH OF TWELVE MORE BYTES: SECURITY ON THE POST-SCARCITY INTERNET
BlackHat USA-2012 - Las Vegas, USA
IPv6
DNSSEC
GTLDs
The IETF & The Future of Security Protocols: All The Signal, None of the Noise
Blackhat Europe-2012 - Amsterdam, The Netherlands
Security
Cloud and Control: Factoring and Cracking
EKoparty-2011 - Buenos Aires,Agentina