Attribute-based Authentication and Signatures in Practice |
Surprise me: What's Coming Next In Privacy Innovation |
OpenINTEL: security benefits from actively measuring 60% of the global DNS every 24 hours |
Security above the network |
Thunderlab: Facilitating (cyber)security research |
Security above the network |
SCIONLab: A Deployment of the SCION Secure Internet Architecture |
Security above the network |
Time and Security: An uneasy relationship |
Security |
Incident handling in the Norwegian academic sector |
Security |
An Indicator Scoring Method For MISP Platforms |
Security |
Universities and colleges on the safe side |
Responsible Education |
The state of the art of Learning Analytics |
Responsible Education |
Activity Data for Assessment and Adaptive Learning |
Responsible Education |
A Regional Networking Ecosystem in Eastern Partnership Countries |
Regional networks, communities and ecosystems |
AARCLight study - year 1 findings |
Regional networks, communities and ecosystems |
In and Out of Africa: Improving Routing for Intl R & E Traffic |
Regional networks, communities and ecosystems |
What does it take to adopt DevOps and SRE? |
People working together |
Building Software Development Teams for Network Automation |
People working together |
Collaborative Product Development - A Managed Firewall Service |
People working together |
What does it take to adopt DevOps and SRE? |
People working together |
Collaborative Product Development - A Managed Firewall Service |
People working together |
Opening Plenary key note 1 : Embodied vulnerabilities – Why I am hacking my own heart |
Opening Plenary |
Campus Identity Providers: Providing and Using toolkits to deploy |
Making Federations Work |