|
Attribute-based Authentication and Signatures in Practice |
Surprise me: What's Coming Next In Privacy Innovation |
|
OpenINTEL: security benefits from actively measuring 60% of the global DNS every 24 hours |
Security above the network |
|
Thunderlab: Facilitating (cyber)security research |
Security above the network |
|
SCIONLab: A Deployment of the SCION Secure Internet Architecture |
Security above the network |
|
Time and Security: An uneasy relationship |
Security |
|
Incident handling in the Norwegian academic sector |
Security |
|
An Indicator Scoring Method For MISP Platforms |
Security |
|
Universities and colleges on the safe side |
Responsible Education |
|
The state of the art of Learning Analytics |
Responsible Education |
|
Activity Data for Assessment and Adaptive Learning |
Responsible Education |
|
A Regional Networking Ecosystem in Eastern Partnership Countries |
Regional networks, communities and ecosystems |
|
AARCLight study - year 1 findings |
Regional networks, communities and ecosystems |
|
In and Out of Africa: Improving Routing for Intl R & E Traffic |
Regional networks, communities and ecosystems |
|
What does it take to adopt DevOps and SRE? |
People working together |
|
Building Software Development Teams for Network Automation |
People working together |
|
Collaborative Product Development - A Managed Firewall Service |
People working together |
|
What does it take to adopt DevOps and SRE? |
People working together |
|
Collaborative Product Development - A Managed Firewall Service |
People working together |
|
Opening Plenary key note 1 : Embodied vulnerabilities – Why I am hacking my own heart |
Opening Plenary |
|
Campus Identity Providers: Providing and Using toolkits to deploy |
Making Federations Work |