ID | Interpret | Skladba | Album | |
31. | USENIX Association | Opening Remarks and Awards | 16th USENIX Security Symposium | |
32. | John Schwartz | Covering Computer Security in The New York Times | 16th USENIX Security Symposium | |
33. | Ben Shneiderman | Human-Computer Interaction | USENIX 14th Security Symposium | |
34. | Ben Shneiderman | Human-Computer Interaction | USENIX 14th Security Symposium | |
35. | Gary McGraw | Exploiting Online Games | 16th USENIX Security Symposium | |
36. | Gary McGraw | Exploiting Online Games | 16th USENIX Security Symposium | |
37. | Gaurav Shah | Keyboards and Covert Channels | USENIX Security Symposium 2006 | |
38. | David Brumley | Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint GenerationTRCK | 16th USENIX Security Symposium | |
39. | Benjamin Cox | N-Variant Systems: A Secretless Framework for Security through Diversity | USENIX Security Symposium 2006 | |
40. | USENIX Association | Opening Remarks and Awards | 16th USENIX Security Symposium | |
41. | Gary McGraw | Exploiting Online Games | 16th USENIX Security Symposium | |
42. | Ben Shneiderman | Human-Computer Interaction | USENIX 14th Security Symposium | |
43. | Ben Shneiderman | Human-Computer Interaction | USENIX 14th Security Symposium | |
44. | Ben Shneiderman | Human-Computer Interaction | USENIX 14th Security Symposium | |
45. | John Schwartz | Covering Computer Security in The New York Times | 16th USENIX Security Symposium | |
46. | David Brumley | Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint GenerationTRCK | 16th USENIX Security Symposium | |
47. | David Wagner | Report of the California Voting Systems Review | 16th USENIX Security Symposium | |
48. | Douglas Maughan | Homeland Security | 14th USENIX Security Symposium | |
49. | Douglas Maughan | Homeland Security | 14th USENIX Security Symposium | |
50. | Ed Felten | Invited Talk - DRM Wars: The Next Generation | USENIX Security Symposium 2006 | |
51. | Ed Felten | Invited Talk - DRM Wars: The Next Generation | USENIX Security Symposium 2006 | |
52. | Ed Felten | Invited Talk - DRM Wars: The Next Generation | USENIX Security Symposium 2006 | |
53. | David Wagner | Report of the California Voting Systems Review | 16th USENIX Security Symposium | |
54. | Douglas Maughan | Homeland Security | 14th USENIX Security Symposium | |
55. | David Wagner | Report of the California Voting Systems Review | 16th USENIX Security Symposium | |
56. | David Brumley | Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint GenerationTRCK | 16th USENIX Security Symposium | |
57. | Debra Bowen, California Secretary of State | Dr. Strangevote or: How I Learned to Stop Worrying and Love the Paper Ballot | 17th USENIX Security Symposium Invited Talks | |
58. | Karsten Nohl and David Evans, University of Virginia; Starbug and Henryk Plötz, Chaos Computer Club, Berlin | Reverse-Engineering a Cryptographic RFID Tag | 17th USENIX Security Symposium Refereed Papers | |
59. | Steven Gianvecchio, Mengjun Xie, Zhengyu Wu, and Haining Wang, The College of William and Mary | Measurement and Classification of Humans and Bots in Internet Chat | 17th USENIX Security Symposium Refereed Papers | |
60. | Owen Harrison and John Waldron, Trinity College Dublin | Practical Symmetric Key Cryptography on Modern Graphics Hardware | 17th USENIX Security Symposium Refereed Papers | |