ID | Interpret | Skladba | Album | |
91. | Stephen Downes | Ruby, Blackboard, and the Challenge for Open Source | Free Software and Open Source Symposium | |
92. | UC Irvine The Great Park Studio | Great Park: Irvine / Design Symposium | Great Park: Irvine / Design Symposium | |
93. | Ed Finkler | Defending Web Applications With PHPSecInfo | 8th Annual CERIAS Information Security Symposium | |
94. | Stephen Downes | Ruby, Blackboard, and the Challenge for Open Source | Free Software and Open Source Symposium | |
95. | Ed Finkler | Defending Web Applications With PHPSecInfo | 8th Annual CERIAS Information Security Symposium | |
96. | Ed Finkler | Defending Web Applications With PHPSecInfo | 8th Annual CERIAS Information Security Symposium | |
97. | Ed Finkler | Defending Web Applications With PHPSecInfo | 8th Annual CERIAS Information Security Symposium | |
98. | Charles Bernstein | No Hiding Place | Conceptual Poetry and Its Others Symposium, University of Arizona, May 31, 2008 | |
99. | Karsten Nohl and David Evans, University of Virginia; Starbug and Henryk Plötz, Chaos Computer Club, Berlin | Reverse-Engineering a Cryptographic RFID Tag | 17th USENIX Security Symposium Refereed Papers | |
100. | Charles Bernstein | introduction to | Conceptual Poetry and Its Others Symposium, University of Arizona, May 31, 2008 | |
101. | Dawson Engler, Stanford University; Ben Chelf, Andy Chou, and Seth Hallem, Coverity | A Few Billion Lines of Code Later: Experiences Commercializing a Static Checking Tool | 17th USENIX Security Symposium Invited Talks | |
102. | Xin Liu, Ang Li, and Xiaowei Yang, University of California, Irvine; David Wetherall, Intel Research Seattle and University of Washington | Passport: Secure and Adoptable Source Authentication | 5th USENIX Symposium on Networked Systems Design and Implementation | |
103. | Gang Tan and Jason Croft, Boston College | An Empirical Security Study of the Native Code in the JDK | 17th USENIX Security Symposium Refereed Papers | |
104. | Ben Adida, Harvard University | Helios: Web-based Open-Audit Voting | 17th USENIX Security Symposium Refereed Papers | |
105. | Niels Provos, Google, Inc. | The Ghost in the Browser and Other Frightening Stories About Web Malware | 17th USENIX Security Symposium Invited Talks | |
106. | Steven Gianvecchio, Mengjun Xie, Zhengyu Wu, and Haining Wang, The College of William and Mary | Measurement and Classification of Humans and Bots in Internet Chat | 17th USENIX Security Symposium Refereed Papers | |
107. | Owen Harrison and John Waldron, Trinity College Dublin | Practical Symmetric Key Cryptography on Modern Graphics Hardware | 17th USENIX Security Symposium Refereed Papers | |
108. | Daniel Sandler, Kyle Derr, and Dan S. Wallach, Rice University | VoteBox: A Tamper-evident, Verifiable Electronic Voting System | 17th USENIX Security Symposium Refereed Papers | |
109. | Charles Bernstein | Kiss Me Tommy | Conceptual Poetry and Its Others Symposium, University of Arizona, May 31, 2008 | |
110. | Michael Martin and Monica S. Lam, Stanford University | Automatic Generation of XSS and SQL Injection Attacks with Goal-Directed Model Checking | 17th USENIX Security Symposium Refereed Papers | |
111. | Jerry Chou and Bill Lin, University of California, San Diego; Subhabrata Sen and Oliver Spatscheck, AT&T Labs | Proactive Surge Protection: A Defense Mechanism for Bandwidth-Based Attacks | 17th USENIX Security Symposium Refereed Papers | |
112. | Jose Nazario, Senior Security Engineer, Arbor Networks | Political DDoS: Estonia and Beyond | 17th USENIX Security Symposium Invited Talks | |
113. | Charles Bernstein | All the Whiskey in Heaven | Conceptual Poetry and Its Others Symposium, University of Arizona, May 31, 2008 | |
114. | Charles Bernstein and Tracie Morris | Truth Be Told, collaboration with Tracie Morris | Conceptual Poetry and Its Others Symposium, University of Arizona, May 31, 2008 | |
115. | Guofei Gu, Georgia Institute of Technology; Roberto Perdisci, Damballa, Inc.; Junjie Zhang and Wenke Lee, Georgia Institute of Technology | BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection | 17th USENIX Security Symposium Refereed Papers | |
116. | Ari Juels, RSA Laboratories; Ravikanth Pappu, ThingMagic Inc; Bryan Parno, Carnegie Mellon University | Unidirectional Key Distribution Across Time and Space with Applications to RFID Security | 17th USENIX Security Symposium Refereed Papers | |
117. | Charles Bernstein | introduction to Dea%r Fr~ien%d | Conceptual Poetry and Its Others Symposium, University of Arizona, May 31, 2008 | |
118. | Swaminathan Sundararaman, Gopalan Sivathanu, and Erez Zadok, Stony Brook University | Selective Versioning in a Secure Disk System | 17th USENIX Security Symposium Refereed Papers | |
119. | Negar Kiyavash, Amir Houmansadr, and Nikita Borisov, University of Illinois at Urbana-Champaign | Multi-flow Attacks Against Network Flow Watermarking Schemes | 17th USENIX Security Symposium Refereed Papers | |
120. | Thomas Porter | Distributive Subjectivism, Liberal Neutrality, and the Expensive Tastes Intuition | Public Reason's Political Philosophy Podcast Symposium | |