ID | Interpret | Skladba | Album | |
31. | DJ MUNEO | service | THE MUNEO HOUSE 17th | |
32. | DJ MUNEO | @jÌvCh | THE MUNEO HOUSE 17th | |
33. | Ed's Mixed Bag podcast | Christmas Specials Reminder | Dec. 3rd, 10th, 17th, & 24th | |
34. | Zoe Daniel | Church leaders act against Zimbabwe slum clearance | CR - July 17th, 2005 | |
35. | DJ MUNEO | liftoff | THE MUNEO HOUSE 17th | |
36. | Guns N' Roses | Nightrain | Live In Philadelphia -Dec 17th | |
37. | DJ MUNEO | crazy-nonaka | THE MUNEO HOUSE 17th | |
38. | Altri Stromenti | Altri Stromenti - Italian Music of the 17th Century - [complete Magnatune album] | Italian Music of the 17th Century | |
39. | Altri Stromenti | La Savorgnana | Italian Music of the 17th Century | |
40. | DUBCNN.COM: Ice Cube ft. Nas & Scarface | Gangsta Rap Made Me Do It | Raw Footage In Stores June 17th! | |
41. | CBC Radio: Vinyl Cafe Stories | vinylcafe 2007-11-17 | VC: November 17th, 2007 Home Recordings | |
42. | Julie Kabat, Ben Hudson | The Helmsman SAMPLE | La Musica: 16th, 17th C. Music & Surprise | |
43. | Jose Nazario, Senior Security Engineer, Arbor Networks | Political DDoS: Estonia and Beyond | 17th USENIX Security Symposium Invited Talks | |
44. | Owen Harrison and John Waldron, Trinity College Dublin | Practical Symmetric Key Cryptography on Modern Graphics Hardware | 17th USENIX Security Symposium Refereed Papers | |
45. | Steven Gianvecchio, Mengjun Xie, Zhengyu Wu, and Haining Wang, The College of William and Mary | Measurement and Classification of Humans and Bots in Internet Chat | 17th USENIX Security Symposium Refereed Papers | |
46. | Sam Small, Joshua Mason, and Fabian Monrose, Johns Hopkins University; Niels Provos, Google Inc.; Adam Stubblefield, Johns Hopkins University | To Catch a Predator: A Natural Language Approach for Eliciting Malicious Payloads | 17th USENIX Security Symposium Refereed Papers | |
47. | Karsten Nohl and David Evans, University of Virginia; Starbug and Henryk Plötz, Chaos Computer Club, Berlin | Reverse-Engineering a Cryptographic RFID Tag | 17th USENIX Security Symposium Refereed Papers | |
48. | Ben Adida, Harvard University | Helios: Web-based Open-Audit Voting | 17th USENIX Security Symposium Refereed Papers | |
49. | Swaminathan Sundararaman, Gopalan Sivathanu, and Erez Zadok, Stony Brook University | Selective Versioning in a Secure Disk System | 17th USENIX Security Symposium Refereed Papers | |
50. | Adam Barth, Collin Jackson, and John C. Mitchell, Stanford University | Securing Frame Communication in Browsers | 17th USENIX Security Symposium Refereed Papers | |
51. | Thomas Ristenpart, University of California, San Diego; Gabriel Maganis, Arvind Krishnamurthy, and Tadayoshi Kohno, University of Washington | Privacy-Preserving Location Tracking of Lost or Stolen Devices: Cryptographic Techniques and Replacing Trusted Third Parties with DHTs | 17th USENIX Security Symposium Refereed Papers | |
52. | Jon Oberheide, Evan Cooke, and Farnam Jahanian, University of Michigan | CloudAV: N-Version Antivirus in the Network Cloud | 17th USENIX Security Symposium Refereed Papers | |
53. | Dawson Engler, Stanford University; Ben Chelf, Andy Chou, and Seth Hallem, Coverity | A Few Billion Lines of Code Later: Experiences Commercializing a Static Checking Tool | 17th USENIX Security Symposium Invited Talks | |
54. | Ari Juels, RSA Laboratories; Ravikanth Pappu, ThingMagic Inc; Bryan Parno, Carnegie Mellon University | Unidirectional Key Distribution Across Time and Space with Applications to RFID Security | 17th USENIX Security Symposium Refereed Papers | |
55. | Jerry Chou and Bill Lin, University of California, San Diego; Subhabrata Sen and Oliver Spatscheck, AT&T Labs | Proactive Surge Protection: A Defense Mechanism for Bandwidth-Based Attacks | 17th USENIX Security Symposium Refereed Papers | |
56. | Negar Kiyavash, Amir Houmansadr, and Nikita Borisov, University of Illinois at Urbana-Champaign | Multi-flow Attacks Against Network Flow Watermarking Schemes | 17th USENIX Security Symposium Refereed Papers | |
57. | Sebastian Zander, Swinburne University of Technology, Australia; Steven J. Murdoch, Computer Laboratory, University of Cambridge | An Improved Clock-skew Measurement Technique for Revealing Hidden Services | 17th USENIX Security Symposium Refereed Papers | |
58. | Gang Tan and Jason Croft, Boston College | An Empirical Security Study of the Native Code in the JDK | 17th USENIX Security Symposium Refereed Papers | |
59. | Daniel Sandler, Kyle Derr, and Dan S. Wallach, Rice University | VoteBox: A Tamper-evident, Verifiable Electronic Voting System | 17th USENIX Security Symposium Refereed Papers | |
60. | Barnaby Brown | Chehotrao hodro | Classical Gaelic Piping of the 16th & 17th Centuries | |