ID | Interpret | Skladba | Album | |
61. | Ari Juels, RSA Laboratories; Ravikanth Pappu, ThingMagic Inc; Bryan Parno, Carnegie Mellon University | Unidirectional Key Distribution Across Time and Space with Applications to RFID Security | 17th USENIX Security Symposium Refereed Papers | |
62. | Jose Nazario, Senior Security Engineer, Arbor Networks | Political DDoS: Estonia and Beyond | 17th USENIX Security Symposium Invited Talks | |
63. | Guofei Gu, Georgia Institute of Technology; Roberto Perdisci, Damballa, Inc.; Junjie Zhang and Wenke Lee, Georgia Institute of Technology | BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection | 17th USENIX Security Symposium Refereed Papers | |
64. | Jon Oberheide, Evan Cooke, and Farnam Jahanian, University of Michigan | CloudAV: N-Version Antivirus in the Network Cloud | 17th USENIX Security Symposium Refereed Papers | |
65. | Niels Provos, Google, Inc. | The Ghost in the Browser and Other Frightening Stories About Web Malware | 17th USENIX Security Symposium Invited Talks | |
66. | Sebastian Zander, Swinburne University of Technology, Australia; Steven J. Murdoch, Computer Laboratory, University of Cambridge | An Improved Clock-skew Measurement Technique for Revealing Hidden Services | 17th USENIX Security Symposium Refereed Papers | |
67. | Swaminathan Sundararaman, Gopalan Sivathanu, and Erez Zadok, Stony Brook University | Selective Versioning in a Secure Disk System | 17th USENIX Security Symposium Refereed Papers | |
68. | Owen Harrison and John Waldron, Trinity College Dublin | Practical Symmetric Key Cryptography on Modern Graphics Hardware | 17th USENIX Security Symposium Refereed Papers | |
69. | Steven Gianvecchio, Mengjun Xie, Zhengyu Wu, and Haining Wang, The College of William and Mary | Measurement and Classification of Humans and Bots in Internet Chat | 17th USENIX Security Symposium Refereed Papers | |
70. | Michael Martin and Monica S. Lam, Stanford University | Automatic Generation of XSS and SQL Injection Attacks with Goal-Directed Model Checking | 17th USENIX Security Symposium Refereed Papers | |
71. | Debra Bowen, California Secretary of State | Dr. Strangevote or: How I Learned to Stop Worrying and Love the Paper Ballot | 17th USENIX Security Symposium Invited Talks | |
72. | Rui Wang and XiaoFeng Wang, Indiana University at Bloomington; Zhuowei Li, Center for Software Excellence, Microsoft | Panalyst: Privacy-Aware Remote Error Analysis on Commodity Software | 17th USENIX Security Symposium Refereed Papers | |
73. | Sam Small, Joshua Mason, and Fabian Monrose, Johns Hopkins University; Niels Provos, Google Inc.; Adam Stubblefield, Johns Hopkins University | To Catch a Predator: A Natural Language Approach for Eliciting Malicious Payloads | 17th USENIX Security Symposium Refereed Papers | |
74. | Barnaby Brown | Chehotrao hodro | Classical Gaelic Piping of the 16th & 17th Centuries | |
75. | Jerry Chou and Bill Lin, University of California, San Diego; Subhabrata Sen and Oliver Spatscheck, AT&T Labs | Proactive Surge Protection: A Defense Mechanism for Bandwidth-Based Attacks | 17th USENIX Security Symposium Refereed Papers | |
76. | Adam Barth, Collin Jackson, and John C. Mitchell, Stanford University | Securing Frame Communication in Browsers | 17th USENIX Security Symposium Refereed Papers | |
77. | Lucas Ballard and Seny Kamara, The Johns Hopkins University; Michael K. Reiter, University of North Carolina at Chapel Hill | The Practical Subtleties of Biometric Key Generation | 17th USENIX Security Symposium Refereed Papers | |
78. | Gang Tan and Jason Croft, Boston College | An Empirical Security Study of the Native Code in the JDK | 17th USENIX Security Symposium Refereed Papers | |
79. | SOUL FUNKTION Radio September 17th, 2008 DJ Offbeat and DJ AQBT www.FutureHistoryOfHouse.com | - | SOUL FUNKTION Radio September 17th, 2008 DJ Offbeat and DJ AQBT www.FutureHistoryOfHouse.com | |
80. | iax | fit and in love | Electro House ,Filthy House, Dirty Electro, ohh....and Funky house | |
81. | iax | This is how I get down | Electro House ,Filthy House, Dirty Electro, ohh....and Funky house | |
82. | Pal Joey | Trapped (dance version) | The History of the House Sound Of Chicago CD01 - The Tracks That Built The House | |
83. | Spencer & Hill | Heads Off | Kontor House of House Volume 5 Romanian Edition | |
84. | Guided by Voices | 26 - Alone, Stinking and Unafraid | Bug House: 'Broadcastor House' in Miniature and Under Glass | |
85. | Guided by Voices | 18 - Delayed Reaction Brats | Bug House: 'Broadcastor House' in Miniature and Under Glass | |
86. | Guided by Voices | 07 - Subspace Biographies | Bug House: 'Broadcastor House' in Miniature and Under Glass | |
87. | Guided by Voices | 21 - | Bug House: 'Broadcastor House' in Miniature and Under Glass | |
88. | Guided by Voices | 20 - My Impression Now | Bug House: 'Broadcastor House' in Miniature and Under Glass | |
89. | Guided by Voices | 15 - Burning Flag Birthday Suit | Bug House: 'Broadcastor House' in Miniature and Under Glass | |
90. | Guided by Voices | 03 - Bulldog Skin | Bug House: 'Broadcastor House' in Miniature and Under Glass | |