ID | Interpret | Skladba | Album | |
91. | cryptocrat, Boris Danev | RF fingerprinting of RFID | Chaos Communication Congress 2008 (25c3) | |
92. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
93. | Martin Ling | Flying for free | Chaos Communication Congress 2008 (25c3) | |
94. | Zach Hoeken | Objects as Software: The Coming Revolution | Chaos Communication Congress 2008 (25c3) | |
95. | Zach Hoeken | Objects as Software: The Coming Revolution | Chaos Communication Congress 2008 (25c3) | |
96. | Zach Hoeken | Objects as Software: The Coming Revolution | Chaos Communication Congress 2008 (25c3) | |
97. | Zach Hoeken | Objects as Software: The Coming Revolution | Chaos Communication Congress 2008 (25c3) | |
98. | Zach Hoeken | Objects as Software: The Coming Revolution | Chaos Communication Congress 2008 (25c3) | |
99. | Zach Hoeken | Objects as Software: The Coming Revolution | Chaos Communication Congress 2008 (25c3) | |
100. | Zach Hoeken | Objects as Software: The Coming Revolution | Chaos Communication Congress 2008 (25c3) | |
101. | Zach Hoeken | Objects as Software: The Coming Revolution | Chaos Communication Congress 2008 (25c3) | |
102. | cryptocrat, Boris Danev | RF fingerprinting of RFID | Chaos Communication Congress 2008 (25c3) | |
103. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
104. | Bernhard Fischer, Daniel Haslinger | OnionCat A Tor-based Anonymous VPN | Chaos Communication Congress 2008 (25c3) | |
105. | Dan Kaminsky | Why were we so vulnerable to the DNS vulnerability? | Chaos Communication Congress 2008 (25c3) | |
106. | Felix Leder, Mark Schloesser | Stormfucker: Owning the Storm Botnet | Chaos Communication Congress 2008 (25c3) | |
107. | Bernhard Fischer, Daniel Haslinger | OnionCat A Tor-based Anonymous VPN | Chaos Communication Congress 2008 (25c3) | |
108. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
109. | Bernhard Fischer, Daniel Haslinger | OnionCat A Tor-based Anonymous VPN | Chaos Communication Congress 2008 (25c3) | |
110. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
111. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
112. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
113. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
114. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
115. | Dan Kaminsky | Why were we so vulnerable to the DNS vulnerability? | Chaos Communication Congress 2008 (25c3) | |
116. | Dan Kaminsky | Why were we so vulnerable to the DNS vulnerability? | Chaos Communication Congress 2008 (25c3) | |
117. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
118. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
119. | Dan Kaminsky | Why were we so vulnerable to the DNS vulnerability? | Chaos Communication Congress 2008 (25c3) | |
120. | Dan Kaminsky | Why were we so vulnerable to the DNS vulnerability? | Chaos Communication Congress 2008 (25c3) | |