Sciweavers

1564 search results - page 70 / 313
» Security in Practice - Security-Usability Chasm
Sort
View
ASIACRYPT
2007
Springer
15 years 4 months ago
Fully Anonymous Group Signatures Without Random Oracles
We construct a new group signature scheme using bilinear groups. The group signature scheme is practical, both keys and group signatures consist of a constant number of group elem...
Jens Groth
FOSAD
2008
Springer
14 years 11 months ago
Electronic Voting in the Netherlands: From Early Adoption to Early Abolishment
This paper discusses how electronic voting was implemented in practice in the Netherlands, which choices were made and how electronic voting was finally abolished. This history is ...
Bart Jacobs, Wolter Pieters
EVOTING
2004
113views Hardware» more  EVOTING 2004»
14 years 11 months ago
E-Voting and Biometric Systems
: As e-Voting gains more importance while practicable solutions are being implemented, more questions arise concerning alternative possibilities for a secure and feasible authentic...
Sonja Hof
MOZ
2004
Springer
15 years 3 months ago
The Structure of Authority: Why Security Is Not a Separable Concern
Common programming practice grants excess authority for the sake of functionality; programming principles require least authority for the sake of security. If we practice our princ...
Mark S. Miller, Bill Tulloh, Jonathan S. Shapiro
ISSE
2010
14 years 8 months ago
A second look at Faster, Better, Cheaper
“Faster, Better, Cheaper” (FBC) was a systems development methodology used by NASA in the 1990s. While usually a deprecated practice, we find that, with certain caveats, it is...
Oussama El-Rawas, Tim Menzies