Sciweavers

1564 search results - page 183 / 313
» Security in Practice - Security-Usability Chasm
Sort
View
HICSS
2010
IEEE
157views Biometrics» more  HICSS 2010»
15 years 4 months ago
Design Principles for Power Grid Cyber-Infrastructure Authentication Protocols
Recently, there has been an increased focus and a sense of urgency in developing standards for Power Grid systems centered on the need for interoperability. Given the threat again...
Himanshu Khurana, Rakeshbabu Bobba, Timothy M. Yar...
AFRICACRYPT
2010
Springer
15 years 4 months ago
Fair Blind Signatures without Random Oracles
A fair blind signature is a blind signature with revocable anonymity and unlinkability, i.e., an authority can link an issuing session to the resulting signature and trace a signat...
Georg Fuchsbauer, Damien Vergnaud
ACSAC
2009
IEEE
15 years 4 months ago
The Design of a Trustworthy Voting System
– After the voting debacle in the Florida Presidential election of 2000 with its now-fabled hanging chads and pregnant chads, many voting jurisdictions turned to electronic votin...
Nathanael Paul, Andrew S. Tanenbaum
CTRSA
2009
Springer
142views Cryptology» more  CTRSA 2009»
15 years 4 months ago
Attacks on the DECT Authentication Mechanisms
Digital Enhanced Cordless Telecommunications (DECT) is a standard for connecting cordless telephones to a fixed telecommunications network over a short range. The cryptographic al...
Stefan Lucks, Andreas Schuler, Erik Tews, Ralf-Phi...
TRUSTBUS
2009
Springer
15 years 4 months ago
An Anonymous Credit Card System
Abstract. Credit cards have many important benefits; however, these same benefits often carry with them many privacy concerns. In particular, the need for users to be able to mon...
Elli Androulaki, Steven M. Bellovin