ID | Interpret | Skladba | Album | |
151. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
152. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
153. | Dan Kaminsky | Why were we so vulnerable to the DNS vulnerability? | Chaos Communication Congress 2008 (25c3) | |
154. | Dan Kaminsky | Why were we so vulnerable to the DNS vulnerability? | Chaos Communication Congress 2008 (25c3) | |
155. | Dan Kaminsky | Why were we so vulnerable to the DNS vulnerability? | Chaos Communication Congress 2008 (25c3) | |
156. | Dan Kaminsky | Why were we so vulnerable to the DNS vulnerability? | Chaos Communication Congress 2008 (25c3) | |
157. | Kai Schubert, Christoph Brüning | The Privacy Workshop Project | Chaos Communication Congress 2008 (25c3) | |
158. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
159. | Dan Kaminsky | Why were we so vulnerable to the DNS vulnerability? | Chaos Communication Congress 2008 (25c3) | |
160. | Kai Schubert, Christoph Brüning | The Privacy Workshop Project | Chaos Communication Congress 2008 (25c3) | |
161. | Kai Schubert, Christoph Brüning | The Privacy Workshop Project | Chaos Communication Congress 2008 (25c3) | |
162. | Sandro Gaycken, John Gilmore | Opening and Keynote 'Nothing to hide' | Chaos Communication Congress 2008 (25c3) | |
163. | Ron, Frank Rieger | Security Nightmares 2009 | Chaos Communication Congress 2008 (25c3) | |
164. | Ron, Frank Rieger | Security Nightmares 2009 | Chaos Communication Congress 2008 (25c3) | |
165. | Ron, Frank Rieger | Security Nightmares 2009 | Chaos Communication Congress 2008 (25c3) | |
166. | Bernhard Fischer, Daniel Haslinger | OnionCat A Tor-based Anonymous VPN | Chaos Communication Congress 2008 (25c3) | |
167. | Ben Kurtz | Short Attention Span Security | Chaos Communication Congress 2008 (25c3) | |
168. | Ron, Frank Rieger | Security Nightmares 2009 | Chaos Communication Congress 2008 (25c3) | |
169. | Tor E. Bjørstad | An introduction to new stream cipher designs | Chaos Communication Congress 2008 (25c3) | |
170. | Ron, Frank Rieger | Security Nightmares 2009 | Chaos Communication Congress 2008 (25c3) | |
171. | Ron, Frank Rieger | Security Nightmares 2009 | Chaos Communication Congress 2008 (25c3) | |
172. | Tor E. Bjørstad | An introduction to new stream cipher designs | Chaos Communication Congress 2008 (25c3) | |
173. | Ron, Frank Rieger | Security Nightmares 2009 | Chaos Communication Congress 2008 (25c3) | |
174. | Ron, Frank Rieger | Security Nightmares 2009 | Chaos Communication Congress 2008 (25c3) | |
175. | Markus Beckedahl, Jérémie Zimmermann | La Quadrature du Net - Campaigning on Telecoms Package | Chaos Communication Congress 2008 (25c3) | |
176. | Markus Beckedahl, Jérémie Zimmermann | La Quadrature du Net - Campaigning on Telecoms Package | Chaos Communication Congress 2008 (25c3) | |
177. | Ben Kurtz | Short Attention Span Security | Chaos Communication Congress 2008 (25c3) | |
178. | Ron, Frank Rieger | Security Nightmares 2009 | Chaos Communication Congress 2008 (25c3) | |
179. | Ron, Frank Rieger | Security Nightmares 2009 | Chaos Communication Congress 2008 (25c3) | |
180. | Ron, Frank Rieger | Security Nightmares 2009 | Chaos Communication Congress 2008 (25c3) | |