Anne Lynn Wheeler wrote:
Ed Gerck wrote:
Regarding PKI, the X.509 idea is not just to automate the process of
reliance but to do so without introducing vulnerabilities in the
threat model considered in the CPS.
but that is one of the points of the article that as you automate more
things
--- begin forwarded text
Delivered-To: [EMAIL PROTECTED]
Date: Thu, 8 Dec 2005 15:59:25 -0500
To: Philodox Clips List [EMAIL PROTECTED]
From: R. A. Hettinga [EMAIL PROTECTED]
Subject: [Clips] Study Finds Mass Data Breaches Not as Risky as Smaller
Lapses
Reply-To: [EMAIL PROTECTED]
--
From: Anne Lynn Wheeler
[EMAIL PROTECTED]
PKI is trying to offer some added value in first time
communication between two strangers
However, the main point of attack is phishing, when an
outsider attempts to interpose himself, the man in the
middle, into an existing
--
James A. Donald:
We can, and should, compare any system with the
attacks that are made upon it. As a boat
should resist every probable storm, and if it
does not it is a bad boat, an encryption system
should resist every real threat, and if it does
not it is a
On Thu, Dec 08, 2005 at 09:40:22AM -0800, Aram Perez wrote:
On Dec 7, 2005, at 10:24 PM, James A. Donald wrote:
Aram Perez
James A. Donald:
We can, and should, compare any system with the
attacks that are made upon it. As a boat should
resist every probable storm, and if it does not it
is
Does anyone here have any links to voting system designs that use
cryptography to achieve their goals?
Have a look at www.scytl.com
Neil Mitchison
-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe