ID | Interpret | Skladba | Album | |
31. | cryptocrat, Boris Danev | RF fingerprinting of RFID | Chaos Communication Congress 2008 (25c3) | |
32. | Ben Kurtz | Short Attention Span Security | Chaos Communication Congress 2008 (25c3) | |
33. | Emerson | Hacking in the age of declining everything | Chaos Communication Congress 2007 (24c3) | |
34. | Tor E. Bjørstad | An introduction to new stream cipher designs | Chaos Communication Congress 2008 (25c3) | |
35. | Stefan Esser | Vulnerability discovery in encrypted closed source PHP applications | Chaos Communication Congress 2008 (25c3) | |
36. | Stefan Esser | Vulnerability discovery in encrypted closed source PHP applications | Chaos Communication Congress 2008 (25c3) | |
37. | Stefan Esser | Vulnerability discovery in encrypted closed source PHP applications | Chaos Communication Congress 2008 (25c3) | |
38. | Stefan Esser | Vulnerability discovery in encrypted closed source PHP applications | Chaos Communication Congress 2008 (25c3) | |
39. | Stefan Esser | Vulnerability discovery in encrypted closed source PHP applications | Chaos Communication Congress 2008 (25c3) | |
40. | Tor E. Bjørstad | An introduction to new stream cipher designs | Chaos Communication Congress 2008 (25c3) | |
41. | Stefan Esser | Vulnerability discovery in encrypted closed source PHP applications | Chaos Communication Congress 2008 (25c3) | |
42. | Tor E. Bjørstad | An introduction to new stream cipher designs | Chaos Communication Congress 2008 (25c3) | |
43. | Bernhard Fischer, Daniel Haslinger | OnionCat A Tor-based Anonymous VPN | Chaos Communication Congress 2008 (25c3) | |
44. | Dan Kaminsky | Why were we so vulnerable to the DNS vulnerability? | Chaos Communication Congress 2008 (25c3) | |
45. | Ricardo Cristof Remmert-Fontes, Erik Josefsson | Data Retention and PNR | Chaos Communication Congress 2007 (24c3) | |
46. | Ben Kurtz | Short Attention Span Security | Chaos Communication Congress 2008 (25c3) | |
47. | Ben Kurtz | Short Attention Span Security | Chaos Communication Congress 2008 (25c3) | |
48. | Bernhard Fischer, Daniel Haslinger | OnionCat A Tor-based Anonymous VPN | Chaos Communication Congress 2008 (25c3) | |
49. | Bernhard Fischer, Daniel Haslinger | OnionCat A Tor-based Anonymous VPN | Chaos Communication Congress 2008 (25c3) | |
50. | cryptocrat, Boris Danev | RF fingerprinting of RFID | Chaos Communication Congress 2008 (25c3) | |
51. | Bernhard Fischer, Daniel Haslinger | OnionCat A Tor-based Anonymous VPN | Chaos Communication Congress 2008 (25c3) | |
52. | cryptocrat, Boris Danev | RF fingerprinting of RFID | Chaos Communication Congress 2008 (25c3) | |
53. | Bernhard Fischer, Daniel Haslinger | OnionCat A Tor-based Anonymous VPN | Chaos Communication Congress 2008 (25c3) | |
54. | Bernhard Fischer, Daniel Haslinger | OnionCat A Tor-based Anonymous VPN | Chaos Communication Congress 2008 (25c3) | |
55. | Bernhard Fischer, Daniel Haslinger | OnionCat A Tor-based Anonymous VPN | Chaos Communication Congress 2008 (25c3) | |
56. | Bicyclemark | The Arctic Cold War | Chaos Communication Congress 2007 (24c3) | |
57. | cryptocrat, Boris Danev | RF fingerprinting of RFID | Chaos Communication Congress 2008 (25c3) | |
58. | Tor E. Bjørstad | An introduction to new stream cipher designs | Chaos Communication Congress 2008 (25c3) | |
59. | Bernhard Fischer, Daniel Haslinger | OnionCat A Tor-based Anonymous VPN | Chaos Communication Congress 2008 (25c3) | |
60. | Bernhard Fischer, Daniel Haslinger | OnionCat A Tor-based Anonymous VPN | Chaos Communication Congress 2008 (25c3) | |