ID | Interpret | Skladba | Album | |
61. | Alex Aiken | Static Detection of Security Vulnerabilities in Scripting Languages | USENIX Security Symposium 2006 | |
62. | Parisa Tabriz and Damon McCoy | Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting - Q&A | USENIX Security Symposium 2006 | |
63. | Gaurav Shah | Keyboards and Covert Channels | USENIX Security Symposium 2006 | |
64. | Parisa Tabriz and Damon McCoy | Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting | USENIX Security Symposium 2006 | |
65. | Gaurav Shah | Keyboards and Covert Channels - Q&A | USENIX Security Symposium 2006 | |
66. | Benjamin Cox | N-Variant Systems: A Secretless Framework for Security through Diversity | USENIX Security Symposium 2006 | |
67. | Alex Aiken | Static Detection of Security Vulnerabilities in Scripting Languages - Q&A | USENIX Security Symposium 2006 | |
68. | Rich Cannings | Android: Securing a Mobile Platform from the Ground Up | Security 09 | |
69. | ANTIBALAS | War Hero | Security | |
70. | Antibalas | Beaten Metal | Security | |
71. | Peter Gabriel | Shock The Monkey | Security | |
72. | ANTIBALAS | Sanctuary | Security | |
73. | Antibalas Afrobeat Orchestra | Hilo | Security | |
74. | David Dagon | DNS Security: Lessons Learned and The Road Ahead | Security 09 | |
75. | Benjamin Livshits | GATEKEEPER: Mostly Static Enforcement of Security and Reliability Policies for JavaScript Code | Security 09 | |
76. | Crookers ft. Kelis | No Security | No Security | |
77. | Ron Gula | ITC.FS-RonGula-2005.07.01 | Security (ITC) | |
78. | Steve Gibson with Leo Laporte | Security Now 244: Your Questio | Security Now! | |
79. | Ron Gula | ITC.FS-RonGula-2005.07.01 | Security (ITC) | |
80. | Antibalas Afrobeat Orchestra | Filibuster X | Security | |
81. | Scott A. Crosby | Efficient Data Structures for Tamper-Evident Logging | Security 09 | |
82. | William Robertson | Static Enforcement of Web Application Integrity Through Strong Typing | Security 09 | |
83. | Christina Pöpper | Jamming-resistant Broadcast Communication without Shared Keys | Security 09 | |
84. | David Molnar | Dynamic Test Generation to Find Integer Bugs in x86 Binary Linux Programs | Security 09 | |
85. | Steve Gibson with Leo Laporte | Security Now 243: Subverted SS | Security Now! | |
86. | Nathan S. Evans | A Practical Congestion Attack on Tor Using Long Paths | Security 09 | |
87. | Steve Gibson with Leo Laporte | Security Now 243: Subverted SS | Security Now! | |
88. | Raluca Ada Popa | VPriv: Protecting Privacy in Location-Based Vehicular Services | Security 09 | |
89. | Billy Lau | Protecting Confidential Data on Personal Computers with Storage Capsules | Security 09 | |
90. | PGP Corporation | Phil Dunkelberger - CBS Interview on Encryption | PGP¨ Security Podcasts | |