ID | Interpret | Skladba | Album | |
181. | Abd Al Malik | Parfum de Vie | Le face à face des coeurs | |
182. | Abd Al Malik | Sur la Place des Grands Hommes | Le face à face des coeurs | |
183. | Abd Al Malik | 3 Roses Jaunes, La Vie au Conditionnel | Le face à face des coeurs | |
184. | Abd Al Malik | Que Dieu Bénisse la France, Existenciel | Le face à face des coeurs | |
185. | Abd Al Malik | Interview | Le face à face des coeurs | |
186. | Abd Al Malik | Lettre à mon Père | Le face à face des coeurs | |
187. | Abd Al Malik | Le Langage du Coeur (Feat. Mila Tosi) | Le face � face des coeurs | |
188. | Abd Al Malik | Sur la Place des Grands Hommes (Feat. Matteo Falkone) | Le face � face des coeurs | |
189. | Abd Al Malik | Vivre � Deux | Le face � face des coeurs | |
190. | Thomas Ristenpart, University of California, San Diego; Gabriel Maganis, Arvind Krishnamurthy, and Tadayoshi Kohno, University of Washington | Privacy-Preserving Location Tracking of Lost or Stolen Devices: Cryptographic Techniques and Replacing Trusted Third Parties with DHTs | 17th USENIX Security Symposium Refereed Papers | |
191. | Swaminathan Sundararaman, Gopalan Sivathanu, and Erez Zadok, Stony Brook University | Selective Versioning in a Secure Disk System | 17th USENIX Security Symposium Refereed Papers | |
192. | Michael Martin and Monica S. Lam, Stanford University | Automatic Generation of XSS and SQL Injection Attacks with Goal-Directed Model Checking | 17th USENIX Security Symposium Refereed Papers | |
193. | Niels Provos, Google, Inc. | The Ghost in the Browser and Other Frightening Stories About Web Malware | 17th USENIX Security Symposium Invited Talks | |
194. | Adam Barth, Collin Jackson, and John C. Mitchell, Stanford University | Securing Frame Communication in Browsers | 17th USENIX Security Symposium Refereed Papers | |
195. | Rui Wang and XiaoFeng Wang, Indiana University at Bloomington; Zhuowei Li, Center for Software Excellence, Microsoft | Panalyst: Privacy-Aware Remote Error Analysis on Commodity Software | 17th USENIX Security Symposium Refereed Papers | |
196. | Ari Juels, RSA Laboratories; Ravikanth Pappu, ThingMagic Inc; Bryan Parno, Carnegie Mellon University | Unidirectional Key Distribution Across Time and Space with Applications to RFID Security | 17th USENIX Security Symposium Refereed Papers | |
197. | Jose Nazario, Senior Security Engineer, Arbor Networks | Political DDoS: Estonia and Beyond | 17th USENIX Security Symposium Invited Talks | |
198. | Karsten Nohl and David Evans, University of Virginia; Starbug and Henryk Plötz, Chaos Computer Club, Berlin | Reverse-Engineering a Cryptographic RFID Tag | 17th USENIX Security Symposium Refereed Papers | |
199. | Jerry Chou and Bill Lin, University of California, San Diego; Subhabrata Sen and Oliver Spatscheck, AT&T Labs | Proactive Surge Protection: A Defense Mechanism for Bandwidth-Based Attacks | 17th USENIX Security Symposium Refereed Papers | |
200. | Lucas Ballard and Seny Kamara, The Johns Hopkins University; Michael K. Reiter, University of North Carolina at Chapel Hill | The Practical Subtleties of Biometric Key Generation | 17th USENIX Security Symposium Refereed Papers | |