ID | Interpret | Skladba | Album | |
121. | Arjen Kamphuis | Open Source Lobbying, tips from the trenches | Chaos Communication Congress 2007 (24c3) | |
122. | Francesco Ongaro | Tricks: makes you smile | Chaos Communication Congress 2008 (25c3) | |
123. | Francesco Ongaro | Tricks: makes you smile | Chaos Communication Congress 2008 (25c3) | |
124. | Francesco Ongaro | Tricks: makes you smile | Chaos Communication Congress 2008 (25c3) | |
125. | Francesco Ongaro | Tricks: makes you smile | Chaos Communication Congress 2008 (25c3) | |
126. | Francesco Ongaro | Tricks: makes you smile | Chaos Communication Congress 2008 (25c3) | |
127. | Florian Bischof | Sex 2.0 | Chaos Communication Congress 2007 (24c3) | |
128. | Florian Bischof | Sex 2.0 | Chaos Communication Congress 2007 (24c3) | |
129. | Stefan Esser | Vulnerability discovery in encrypted closed source PHP applications | Chaos Communication Congress 2008 (25c3) | |
130. | Tor E. Bjørstad | An introduction to new stream cipher designs | Chaos Communication Congress 2008 (25c3) | |
131. | Kai Schubert, Christoph Brüning | The Privacy Workshop Project | Chaos Communication Congress 2008 (25c3) | |
132. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
133. | Collin Mulliner | Attacking NFC mobile phones | Chaos Communication Congress 2008 (25c3) | |
134. | Collin Mulliner | Attacking NFC mobile phones | Chaos Communication Congress 2008 (25c3) | |
135. | Collin Mulliner | Attacking NFC mobile phones | Chaos Communication Congress 2008 (25c3) | |
136. | Collin Mulliner | Attacking NFC mobile phones | Chaos Communication Congress 2008 (25c3) | |
137. | Collin Mulliner | Attacking NFC mobile phones | Chaos Communication Congress 2008 (25c3) | |
138. | Collin Mulliner | Attacking NFC mobile phones | Chaos Communication Congress 2008 (25c3) | |
139. | Collin Mulliner | Attacking NFC mobile phones | Chaos Communication Congress 2008 (25c3) | |
140. | Collin Mulliner | Attacking NFC mobile phones | Chaos Communication Congress 2008 (25c3) | |
141. | Collin Mulliner | Attacking NFC mobile phones | Chaos Communication Congress 2008 (25c3) | |
142. | Collin Mulliner | Attacking NFC mobile phones | Chaos Communication Congress 2008 (25c3) | |
143. | Collin Mulliner | Attacking NFC mobile phones | Chaos Communication Congress 2008 (25c3) | |
144. | Collin Mulliner | Attacking NFC mobile phones | Chaos Communication Congress 2008 (25c3) | |
145. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
146. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
147. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
148. | Kai Schubert, Christoph Brüning | The Privacy Workshop Project | Chaos Communication Congress 2008 (25c3) | |
149. | Kai Schubert, Christoph Brüning | The Privacy Workshop Project | Chaos Communication Congress 2008 (25c3) | |
150. | Kai Schubert, Christoph Brüning | The Privacy Workshop Project | Chaos Communication Congress 2008 (25c3) | |