Discover
Why Prezi
Products
Create moving, zooming presentations that grab attention and keep it.
Appear right alongside your content while presenting to your audience.
Make stunning interactive charts, reports, maps, infographics, and more.
Anonymity and censor-free communication (Security II)Anonymity and censor-free communication (Security II)WWAnonymity and censor-free communication (Security II)
Anonymity and censor-free communication (IFIP Summerschool)Anonymity and censor-free communication (IFIP Summerschool)WWAnonymity and censor-free communication (IFIP Summerschool)
Secure Internet communicationsSecure Internet communicationsWWSecure Internet communications
Encryption and key exchange for anonymous communications and Tor (COMPGA12, 2015/16)Encryption and key exchange for anonymous communications and Tor (COMPGA12, 2015/16)WWEncryption and key exchange for anonymous communications and Tor (COMPGA12, 2015/16)
Anonymous Communications and Tor (Security II, 2015/16)Anonymous Communications and Tor (Security II, 2015/16)WWAnonymous Communications and Tor (Security II, 2015/16)
Anonymous Communications and Tor (BT Insights)Anonymous Communications and Tor (BT Insights)WWAnonymous Communications and Tor (BT Insights)
Anonymous Communications and TorAnonymous Communications and TorWWAnonymous Communications and Tor
Anonymous Communications and Tor: History and Future ChallengesAnonymous Communications and Tor: History and Future ChallengesWWAnonymous Communications and Tor: History and Future Challenges
History, priorities, and challenges with the Tor ProjectHistory, priorities, and challenges with the Tor ProjectWWHistory, priorities, and challenges with the Tor Project
Anonymous CommunicationsAnonymous CommunicationsWWAnonymous Communications
Science and CensorshipScience and CensorshipWWScience and Censorship
Anonymous Communication and Censorship ResistanceAnonymous Communication and Censorship ResistanceWWAnonymous Communication and Censorship Resistance
The Tor Anonymous Communication Network and its UsersThe Tor Anonymous Communication Network and its UsersWWThe Tor Anonymous Communication Network and its Users
Man-in-the-Middle attacks on EMV: What Happens When You Forget About the UserMan-in-the-Middle attacks on EMV: What Happens When You Forget About the UserWWMan-in-the-Middle attacks on EMV: What Happens When You Forget About the User
Tampering with Tamper-Proof Payment TerminalsTampering with Tamper-Proof Payment TerminalsWWTampering with Tamper-Proof Payment Terminals
Chip & PIN is Broken: What Next?Chip & PIN is Broken: What Next?WWChip & PIN is Broken: What Next?
The Economics of Payment Card Security and Shifting Fraud LiabilityThe Economics of Payment Card Security and Shifting Fraud LiabilityWWThe Economics of Payment Card Security and Shifting Fraud Liability
BCS Hertfordshire: Chip & PIN – 5 years onBCS Hertfordshire: Chip & PIN – 5 years onWWBCS Hertfordshire: Chip & PIN – 5 years on
27C3: Chip and PIN is Broken27C3: Chip and PIN is BrokenWW27C3: Chip and PIN is Broken
ISSE: Chip and PIN is BrokenISSE: Chip and PIN is BrokenWWISSE: Chip and PIN is Broken
Bringing the Customer into AuditBringing the Customer into AuditWWBringing the Customer into Audit
Payment card fraud and banking regulationPayment card fraud and banking regulationWWPayment card fraud and banking regulation
Chip and PIN is BrokenChip and PIN is BrokenWWChip and PIN is Broken