ID | Interpret | Skladba | Album | |
61. | Ben Shneiderman | Human-Computer Interaction | USENIX 14th Security Symposium | |
62. | Parisa Tabriz and Damon McCoy | Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting - Q&A | USENIX Security Symposium 2006 | |
63. | Ben Shneiderman | Human-Computer Interaction | USENIX 14th Security Symposium | |
64. | Ben Shneiderman | Human-Computer Interaction | USENIX 14th Security Symposium | |
65. | Peter S. Langston | Some Velvet Morning Performed By Eedie & Eddie And The Reggaebots | Computing Systems Usenix Music | |
66. | Ben Shneiderman | Human-Computer Interaction | USENIX 14th Security Symposium | |
67. | Ben Shneiderman | Human-Computer Interaction | USENIX 14th Security Symposium | |
68. | USENIX Association | Opening Remarks and Awards | 16th USENIX Security Symposium | |
69. | USENIX Association | Opening Remarks and Awards | 16th USENIX Security Symposium | |
70. | David Brumley | Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint GenerationTRCK | 16th USENIX Security Symposium | |
71. | David Wagner | Report of the California Voting Systems Review | 16th USENIX Security Symposium | |
72. | David Wagner | Report of the California Voting Systems Review | 16th USENIX Security Symposium | |
73. | David Wagner | Report of the California Voting Systems Review | 16th USENIX Security Symposium | |
74. | David Brumley | Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint GenerationTRCK | 16th USENIX Security Symposium | |
75. | Ed Felten | Invited Talk - DRM Wars: The Next Generation | USENIX Security Symposium 2006 | |
76. | Ed Felten | Invited Talk - DRM Wars: The Next Generation | USENIX Security Symposium 2006 | |
77. | Ed Felten | Invited Talk - DRM Wars: The Next Generation | USENIX Security Symposium 2006 | |
78. | Benjamin Cox | N-Variant Systems: A Secretless Framework for Security through Diversity | USENIX Security Symposium 2006 | |
79. | Douglas Maughan | Homeland Security | 14th USENIX Security Symposium | |
80. | Douglas Maughan | Homeland Security | 14th USENIX Security Symposium | |
81. | Douglas Maughan | Homeland Security | 14th USENIX Security Symposium | |
82. | David Brumley | Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint GenerationTRCK | 16th USENIX Security Symposium | |
83. | Parisa Tabriz and Damon McCoy | Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting | USENIX Security Symposium 2006 | |
84. | John Schwartz | Covering Computer Security in The New York Times | 16th USENIX Security Symposium | |
85. | Atul Adya, Erich Nahum, Clem Cole, John Maddog Hall | Introduction and Awards | USENIX '06 Annual Technical Conference | |
86. | John Schwartz | Covering Computer Security in The New York Times | 16th USENIX Security Symposium | |
87. | KyoungSoo Park, Vivek S. Pai | Securing Web Service by Automatic Robot Detection | USENIX '06 Annual Technical Conferecne | |
88. | USENIX Association | Opening Remarks and Awards | 16th USENIX Security Symposium | |
89. | John Schwartz | Covering Computer Security in The New York Times | 16th USENIX Security Symposium | |
90. | Gary McGraw | Exploiting Online Games | 16th USENIX Security Symposium | |