Vše Interpret Skladba Album
mp3seznam.cz - Žádný ze zde umístěných souborů se nenachází na tomto serveru. Proto nezodpovídáme za jejich kvalitu ani za porušování autorských práv - tuto zodpovědnost nese server na který odkazujeme.
IDInterpretSkladbaAlbum
 31. Gaurav Shah Keyboards and Covert Channels - Q&A  USENIX Security Symposium 2006  
 32. Gaurav Shah Keyboards and Covert Channels  USENIX Security Symposium 2006  
 33. Alex Aiken Static Detection of Security Vulnerabilities in Scripting Languages  USENIX Security Symposium 2006  
 34. Jose Nazario, Senior Security Engineer, Arbor Networks Political DDoS: Estonia and Beyond  17th USENIX Security Symposium Invited Talks  
 35. Niels Provos, Google, Inc. The Ghost in the Browser and Other Frightening Stories About Web Malware  17th USENIX Security Symposium Invited Talks  
 36. Gang Tan and Jason Croft, Boston College An Empirical Security Study of the Native Code in the JDK  17th USENIX Security Symposium Refereed Papers  
 37. Rui Wang and XiaoFeng Wang, Indiana University at Bloomington; Zhuowei Li, Center for Software Excellence, Microsoft Panalyst: Privacy-Aware Remote Error Analysis on Commodity Software  17th USENIX Security Symposium Refereed Papers  
 38. Darren Lacey, Chief Information Security Officer, Johns Hopkins University/Johns Hopkins Medicine Managing Insecurity: Practitioner Reflections on Social Costs of Security  17th USENIX Security Symposium Invited Talks  
 39. Michael Dalton, Hari Kannan, and Christos Kozyrakis, Stanford University Real-World Buffer Overflow Protection for User and Kernel Space  17th USENIX Security Symposium Refereed Papers  
 40. Thomas Ristenpart, University of California, San Diego; Gabriel Maganis, Arvind Krishnamurthy, and Tadayoshi Kohno, University of Washington Privacy-Preserving Location Tracking of Lost or Stolen Devices: Cryptographic Techniques and Replacing Trusted Third Parties with DHTs  17th USENIX Security Symposium Refereed Papers  
 41. Michael Martin and Monica S. Lam, Stanford University Automatic Generation of XSS and SQL Injection Attacks with Goal-Directed Model Checking  17th USENIX Security Symposium Refereed Papers  
 42. Steven Gianvecchio, Mengjun Xie, Zhengyu Wu, and Haining Wang, The College of William and Mary Measurement and Classification of Humans and Bots in Internet Chat  17th USENIX Security Symposium Refereed Papers  
 43. Karsten Nohl and David Evans, University of Virginia; Starbug and Henryk Plötz, Chaos Computer Club, Berlin Reverse-Engineering a Cryptographic RFID Tag  17th USENIX Security Symposium Refereed Papers  
 44. Dawson Engler, Stanford University; Ben Chelf, Andy Chou, and Seth Hallem, Coverity A Few Billion Lines of Code Later: Experiences Commercializing a Static Checking Tool  17th USENIX Security Symposium Invited Talks  
 45. Jon Oberheide, Evan Cooke, and Farnam Jahanian, University of Michigan CloudAV: N-Version Antivirus in the Network Cloud  17th USENIX Security Symposium Refereed Papers  
 46. Owen Harrison and John Waldron, Trinity College Dublin Practical Symmetric Key Cryptography on Modern Graphics Hardware  17th USENIX Security Symposium Refereed Papers  
 47. Sebastian Zander, Swinburne University of Technology, Australia; Steven J. Murdoch, Computer Laboratory, University of Cambridge An Improved Clock-skew Measurement Technique for Revealing Hidden Services  17th USENIX Security Symposium Refereed Papers  
 48. Guofei Gu, Georgia Institute of Technology; Roberto Perdisci, Damballa, Inc.; Junjie Zhang and Wenke Lee, Georgia Institute of Technology BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection  17th USENIX Security Symposium Refereed Papers  
 49. Ari Juels, RSA Laboratories; Ravikanth Pappu, ThingMagic Inc; Bryan Parno, Carnegie Mellon University Unidirectional Key Distribution Across Time and Space with Applications to RFID Security  17th USENIX Security Symposium Refereed Papers  
 50. Negar Kiyavash, Amir Houmansadr, and Nikita Borisov, University of Illinois at Urbana-Champaign Multi-flow Attacks Against Network Flow Watermarking Schemes  17th USENIX Security Symposium Refereed Papers  
 51. Sam Small, Joshua Mason, and Fabian Monrose, Johns Hopkins University; Niels Provos, Google Inc.; Adam Stubblefield, Johns Hopkins University To Catch a Predator: A Natural Language Approach for Eliciting Malicious Payloads  17th USENIX Security Symposium Refereed Papers  
 52. Adam Barth, Collin Jackson, and John C. Mitchell, Stanford University Securing Frame Communication in Browsers  17th USENIX Security Symposium Refereed Papers  
 53. Swaminathan Sundararaman, Gopalan Sivathanu, and Erez Zadok, Stony Brook University Selective Versioning in a Secure Disk System  17th USENIX Security Symposium Refereed Papers  
 54. Debra Bowen, California Secretary of State Dr. Strangevote or: How I Learned to Stop Worrying and Love the Paper Ballot  17th USENIX Security Symposium Invited Talks  
 55. Ben Adida, Harvard University Helios: Web-based Open-Audit Voting  17th USENIX Security Symposium Refereed Papers  
 56. Jerry Chou and Bill Lin, University of California, San Diego; Subhabrata Sen and Oliver Spatscheck, AT&T Labs Proactive Surge Protection: A Defense Mechanism for Bandwidth-Based Attacks  17th USENIX Security Symposium Refereed Papers  
 57. Daniel Sandler, Kyle Derr, and Dan S. Wallach, Rice University VoteBox: A Tamper-evident, Verifiable Electronic Voting System  17th USENIX Security Symposium Refereed Papers  
 58. Lucas Ballard and Seny Kamara, The Johns Hopkins University; Michael K. Reiter, University of North Carolina at Chapel Hill The Practical Subtleties of Biometric Key Generation  17th USENIX Security Symposium Refereed Papers  
 59. J. Alex Halderman, Princeton University; Seth D. Schoen, Electronic Frontier Foundation; Nadia Heninger and William Clarkson, Princeton University; William Paul, Wind River Systems; Joseph A. Calandri Lest We Remember: Cold Boot Attacks on Encryption Keys  17th USENIX Security Symposium Refereed Papers  
 60. Xin Liu, Ang Li, and Xiaowei Yang, University of California, Irvine; David Wetherall, Intel Research Seattle and University of Washington Passport: Secure and Adoptable Source Authentication  5th USENIX Symposium on Networked Systems Design and Implementation  
  «    1 2 3 4 5 6 7    »
Gamesníci.cz - Superhry
Přehled nejstahovanějších MP3 za uplynulý den
16.  Wohnout - Pedro se vracístaženo: 1x
17.  Yello - Jingle Bellsstaženo: 1x
18.  Depeche Mode - I Want It Allstaženo: 1x
19.  Alkehol - Hlupák váhástaženo: 1x
20.  Jaromír Nohavica - Chtěl bych zažítstaženo: 1x
21.  Horkýže Slíže - Mao C Tungstaženo: 1x
22.  Daniel Landa - Malá díra v hlavěstaženo: 1x
23.  Rytmus - Zlatokopkystaženo: 1x
24.  Kristina - Horehroniestaženo: 1x
25.  DeTee - Fanfárystaženo: 1x
26.  Tleskač - Zelená Je Trávastaženo: 1x
27.  Queen - We Are the Championsstaženo: 1x
28.  Jaromír Nohavica - Směsstaženo: 1x
29.  Milo - Pro Eliškustaženo: 1x
30.  Depeche Mode - Pipelinestaženo: 1x