ID | Interpret | Skladba | Album | |
121. | John Schwartz | Covering Computer Security in The New York Times | 16th USENIX Security Symposium | |
122. | Gaurav Shah | Keyboards and Covert Channels - Q&A | USENIX Security Symposium 2006 | |
123. | Benjamin Cox | N-Variant Systems: A Secretless Framework for Security through Diversity | USENIX Security Symposium 2006 | |
124. | David Wagner | Report of the California Voting Systems Review | 16th USENIX Security Symposium | |
125. | David Wagner | Report of the California Voting Systems Review | 16th USENIX Security Symposium | |
126. | David Brumley | Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint GenerationTRCK | 16th USENIX Security Symposium | |
127. | David Brumley | Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint GenerationTRCK | 16th USENIX Security Symposium | |
128. | USENIX Association | Opening Remarks and Awards | 16th USENIX Security Symposium | |
129. | DJ Edit | Confessions of a mash-up un-artist | NMC Online Symposium, April 2, 2008 | |
130. | Ed Felten | Invited Talk - DRM Wars: The Next Generation | USENIX Security Symposium 2006 | |
131. | Ed Felten | Invited Talk - DRM Wars: The Next Generation | USENIX Security Symposium 2006 | |
132. | Ben Shneiderman | Human-Computer Interaction | USENIX 14th Security Symposium | |
133. | Ed Finkler | Defending Web Applications With PHPSecInfo | 8th Annual CERIAS Information Security Symposium | |
134. | Ed Finkler | Defending Web Applications With PHPSecInfo | 8th Annual CERIAS Information Security Symposium | |
135. | Ed Finkler | Defending Web Applications With PHPSecInfo | 8th Annual CERIAS Information Security Symposium | |
136. | Ed Finkler | Defending Web Applications With PHPSecInfo | 8th Annual CERIAS Information Security Symposium | |
137. | UC Irvine The Great Park Studio | Great Park: Irvine / Design Symposium | Great Park: Irvine / Design Symposium | |
138. | Stephen Downes | Ruby, Blackboard, and the Challenge for Open Source | Free Software and Open Source Symposium | |
139. | Stephen Downes | Ruby, Blackboard, and the Challenge for Open Source | Free Software and Open Source Symposium | |
140. | Guofei Gu, Georgia Institute of Technology; Roberto Perdisci, Damballa, Inc.; Junjie Zhang and Wenke Lee, Georgia Institute of Technology | BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection | 17th USENIX Security Symposium Refereed Papers | |
141. | Charles Bernstein | Dea%r Fr~ien%d | Conceptual Poetry and Its Others Symposium, University of Arizona, May 31, 2008 | |
142. | Debra Bowen, California Secretary of State | Dr. Strangevote or: How I Learned to Stop Worrying and Love the Paper Ballot | 17th USENIX Security Symposium Invited Talks | |
143. | Charles Bernstein | introduction to Dea%r Fr~ien%d | Conceptual Poetry and Its Others Symposium, University of Arizona, May 31, 2008 | |
144. | Jon Oberheide, Evan Cooke, and Farnam Jahanian, University of Michigan | CloudAV: N-Version Antivirus in the Network Cloud | 17th USENIX Security Symposium Refereed Papers | |
145. | Charles Bernstein | on Blind Witness | Conceptual Poetry and Its Others Symposium, University of Arizona, May 31, 2008 | |
146. | Charles Bernstein | No Hiding Place | Conceptual Poetry and Its Others Symposium, University of Arizona, May 31, 2008 | |
147. | Owen Harrison and John Waldron, Trinity College Dublin | Practical Symmetric Key Cryptography on Modern Graphics Hardware | 17th USENIX Security Symposium Refereed Papers | |
148. | Darren Lacey, Chief Information Security Officer, Johns Hopkins University/Johns Hopkins Medicine | Managing Insecurity: Practitioner Reflections on Social Costs of Security | 17th USENIX Security Symposium Invited Talks | |
149. | J. Alex Halderman, Princeton University; Seth D. Schoen, Electronic Frontier Foundation; Nadia Heninger and William Clarkson, Princeton University; William Paul, Wind River Systems; Joseph A. Calandri | Lest We Remember: Cold Boot Attacks on Encryption Keys | 17th USENIX Security Symposium Refereed Papers | |
150. | Negar Kiyavash, Amir Houmansadr, and Nikita Borisov, University of Illinois at Urbana-Champaign | Multi-flow Attacks Against Network Flow Watermarking Schemes | 17th USENIX Security Symposium Refereed Papers | |