ID | Interpret | Skladba | Album | |
151. | Ed Finkler | Defending Web Applications With PHPSecInfo | 8th Annual CERIAS Information Security Symposium | |
152. | Stephen Downes | Ruby, Blackboard, and the Challenge for Open Source | Free Software and Open Source Symposium | |
153. | Stephen Downes | Ruby, Blackboard, and the Challenge for Open Source | Free Software and Open Source Symposium | |
154. | Ed Finkler | Defending Web Applications With PHPSecInfo | 8th Annual CERIAS Information Security Symposium | |
155. | UC Irvine The Great Park Studio | Great Park: Irvine / Design Symposium | Great Park: Irvine / Design Symposium | |
156. | Lee Ann Brown | Transformation Hymn | Poems Not Fit for the White House, Lincoln Center, February 2003 | |
157. | Xin Liu, Ang Li, and Xiaowei Yang, University of California, Irvine; David Wetherall, Intel Research Seattle and University of Washington | Passport: Secure and Adoptable Source Authentication | 5th USENIX Symposium on Networked Systems Design and Implementation | |
158. | Steven Gianvecchio, Mengjun Xie, Zhengyu Wu, and Haining Wang, The College of William and Mary | Measurement and Classification of Humans and Bots in Internet Chat | 17th USENIX Security Symposium Refereed Papers | |
159. | Owen Harrison and John Waldron, Trinity College Dublin | Practical Symmetric Key Cryptography on Modern Graphics Hardware | 17th USENIX Security Symposium Refereed Papers | |
160. | Charles Bernstein | on Blind Witness | Conceptual Poetry and Its Others Symposium, University of Arizona, May 31, 2008 | |
161. | Charles Bernstein | All the Whiskey in Heaven | Conceptual Poetry and Its Others Symposium, University of Arizona, May 31, 2008 | |
162. | Michael Dalton, Hari Kannan, and Christos Kozyrakis, Stanford University | Real-World Buffer Overflow Protection for User and Kernel Space | 17th USENIX Security Symposium Refereed Papers | |
163. | Charles Bernstein | No Hiding Place | Conceptual Poetry and Its Others Symposium, University of Arizona, May 31, 2008 | |
164. | Charles Bernstein | Kiss Me Tommy | Conceptual Poetry and Its Others Symposium, University of Arizona, May 31, 2008 | |
165. | Charles Bernstein | on Blind Witness | Conceptual Poetry and Its Others Symposium, University of Arizona, May 31, 2008 | |
166. | Dawson Engler, Stanford University; Ben Chelf, Andy Chou, and Seth Hallem, Coverity | A Few Billion Lines of Code Later: Experiences Commercializing a Static Checking Tool | 17th USENIX Security Symposium Invited Talks | |
167. | Rui Wang and XiaoFeng Wang, Indiana University at Bloomington; Zhuowei Li, Center for Software Excellence, Microsoft | Panalyst: Privacy-Aware Remote Error Analysis on Commodity Software | 17th USENIX Security Symposium Refereed Papers | |
168. | Charles Bernstein | annagrammatica from Shadowtime | Conceptual Poetry and Its Others Symposium, University of Arizona, May 31, 2008 | |
169. | Jon Oberheide, Evan Cooke, and Farnam Jahanian, University of Michigan | CloudAV: N-Version Antivirus in the Network Cloud | 17th USENIX Security Symposium Refereed Papers | |
170. | Darren Lacey, Chief Information Security Officer, Johns Hopkins University/Johns Hopkins Medicine | Managing Insecurity: Practitioner Reflections on Social Costs of Security | 17th USENIX Security Symposium Invited Talks | |
171. | Charles Bernstein | Some Remarks on Poetry and Framing | Conceptual Poetry and Its Others Symposium, University of Arizona, May 31, 2008 | |
172. | Charles Bernstein | Some Remarks on Poetry and Framing | Conceptual Poetry and Its Others Symposium, University of Arizona, May 31, 2008 | |
173. | Charles Bernstein | Kiss Me Tommy | Conceptual Poetry and Its Others Symposium, University of Arizona, May 31, 2008 | |
174. | Ari Juels, RSA Laboratories; Ravikanth Pappu, ThingMagic Inc; Bryan Parno, Carnegie Mellon University | Unidirectional Key Distribution Across Time and Space with Applications to RFID Security | 17th USENIX Security Symposium Refereed Papers | |
175. | Jerry Chou and Bill Lin, University of California, San Diego; Subhabrata Sen and Oliver Spatscheck, AT&T Labs | Proactive Surge Protection: A Defense Mechanism for Bandwidth-Based Attacks | 17th USENIX Security Symposium Refereed Papers | |
176. | Niels Provos, Google, Inc. | The Ghost in the Browser and Other Frightening Stories About Web Malware | 17th USENIX Security Symposium Invited Talks | |
177. | Charles Bernstein | introduction to | Conceptual Poetry and Its Others Symposium, University of Arizona, May 31, 2008 | |
178. | Charles Bernstein and Tracie Morris | Truth Be Told, collaboration with Tracie Morris | Conceptual Poetry and Its Others Symposium, University of Arizona, May 31, 2008 | |
179. | Thomas Ristenpart, University of California, San Diego; Gabriel Maganis, Arvind Krishnamurthy, and Tadayoshi Kohno, University of Washington | Privacy-Preserving Location Tracking of Lost or Stolen Devices: Cryptographic Techniques and Replacing Trusted Third Parties with DHTs | 17th USENIX Security Symposium Refereed Papers | |
180. | Gang Tan and Jason Croft, Boston College | An Empirical Security Study of the Native Code in the JDK | 17th USENIX Security Symposium Refereed Papers | |