ID | Interpret | Skladba | Album | |
61. | DJ MUNEO | service | THE MUNEO HOUSE 17th | |
62. | DJ MUNEO | MUNEO BUGI | THE MUNEO HOUSE 17th | |
63. | DJ MUNEO | THE RED BARON | THE MUNEO HOUSE 17th | |
64. | DJ MUNEO | liftoff | THE MUNEO HOUSE 17th | |
65. | DJ MUNEO | crazy-nonaka | THE MUNEO HOUSE 17th | |
66. | Zoe Daniel | Church leaders act against Zimbabwe slum clearance | CR - July 17th, 2005 | |
67. | DJ MUNEO | Muneo Pulse -Muneo VS ³m- | THE MUNEO HOUSE 17th | |
68. | DUBCNN.COM: Ice Cube ft. Nas & Scarface | Gangsta Rap Made Me Do It | Raw Footage In Stores June 17th! | |
69. | Zion I | DJ DJ | The TakeOver- out February 17th on Gold Dust | |
70. | Zion I | DJ DJ | The TakeOver- out February 17th on Gold Dust | |
71. | Zion I | DJ DJ | The TakeOver- out February 17th on Gold Dust | |
72. | CBC Radio: Vinyl Cafe Stories | vinylcafe 2007-11-17 | VC: November 17th, 2007 Home Recordings | |
73. | Lucas Ballard and Seny Kamara, The Johns Hopkins University; Michael K. Reiter, University of North Carolina at Chapel Hill | The Practical Subtleties of Biometric Key Generation | 17th USENIX Security Symposium Refereed Papers | |
74. | Cerulean's Love of Music | EPISODE 21, JUNE 17TH, '07, LOLA HAS A FACE FOR THE RADIO | EPISODE 21, JUNE 17TH, '07, LOLA HAS A FACE FOR THE RADIO | |
75. | Jon Oberheide, Evan Cooke, and Farnam Jahanian, University of Michigan | CloudAV: N-Version Antivirus in the Network Cloud | 17th USENIX Security Symposium Refereed Papers | |
76. | Debra Bowen, California Secretary of State | Dr. Strangevote or: How I Learned to Stop Worrying and Love the Paper Ballot | 17th USENIX Security Symposium Invited Talks | |
77. | Ari Juels, RSA Laboratories; Ravikanth Pappu, ThingMagic Inc; Bryan Parno, Carnegie Mellon University | Unidirectional Key Distribution Across Time and Space with Applications to RFID Security | 17th USENIX Security Symposium Refereed Papers | |
78. | Sebastian Zander, Swinburne University of Technology, Australia; Steven J. Murdoch, Computer Laboratory, University of Cambridge | An Improved Clock-skew Measurement Technique for Revealing Hidden Services | 17th USENIX Security Symposium Refereed Papers | |
79. | Thomas Ristenpart, University of California, San Diego; Gabriel Maganis, Arvind Krishnamurthy, and Tadayoshi Kohno, University of Washington | Privacy-Preserving Location Tracking of Lost or Stolen Devices: Cryptographic Techniques and Replacing Trusted Third Parties with DHTs | 17th USENIX Security Symposium Refereed Papers | |
80. | Jose Nazario, Senior Security Engineer, Arbor Networks | Political DDoS: Estonia and Beyond | 17th USENIX Security Symposium Invited Talks | |
81. | Swaminathan Sundararaman, Gopalan Sivathanu, and Erez Zadok, Stony Brook University | Selective Versioning in a Secure Disk System | 17th USENIX Security Symposium Refereed Papers | |
82. | Darren Lacey, Chief Information Security Officer, Johns Hopkins University/Johns Hopkins Medicine | Managing Insecurity: Practitioner Reflections on Social Costs of Security | 17th USENIX Security Symposium Invited Talks | |
83. | Michael Dalton, Hari Kannan, and Christos Kozyrakis, Stanford University | Real-World Buffer Overflow Protection for User and Kernel Space | 17th USENIX Security Symposium Refereed Papers | |
84. | Michael Martin and Monica S. Lam, Stanford University | Automatic Generation of XSS and SQL Injection Attacks with Goal-Directed Model Checking | 17th USENIX Security Symposium Refereed Papers | |
85. | Steven Gianvecchio, Mengjun Xie, Zhengyu Wu, and Haining Wang, The College of William and Mary | Measurement and Classification of Humans and Bots in Internet Chat | 17th USENIX Security Symposium Refereed Papers | |
86. | Owen Harrison and John Waldron, Trinity College Dublin | Practical Symmetric Key Cryptography on Modern Graphics Hardware | 17th USENIX Security Symposium Refereed Papers | |
87. | Ben Adida, Harvard University | Helios: Web-based Open-Audit Voting | 17th USENIX Security Symposium Refereed Papers | |
88. | J. Alex Halderman, Princeton University; Seth D. Schoen, Electronic Frontier Foundation; Nadia Heninger and William Clarkson, Princeton University; William Paul, Wind River Systems; Joseph A. Calandri | Lest We Remember: Cold Boot Attacks on Encryption Keys | 17th USENIX Security Symposium Refereed Papers | |
89. | Daniel Sandler, Kyle Derr, and Dan S. Wallach, Rice University | VoteBox: A Tamper-evident, Verifiable Electronic Voting System | 17th USENIX Security Symposium Refereed Papers | |
90. | Guofei Gu, Georgia Institute of Technology; Roberto Perdisci, Damballa, Inc.; Junjie Zhang and Wenke Lee, Georgia Institute of Technology | BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection | 17th USENIX Security Symposium Refereed Papers | |