Date: Mon, 5 Jul 2004 13:29:39 -0400 (EDT)
From: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: PORTIA workshop on sensitive data, July 8-9, 2004, Stanford Univ.
The final workshop program is available at
http://crypto.stanford.edu/portia/workshops/2004_7_prog.html
Some potential
Original Message
Subject: Financial Cryptography Update: The Ricardian Contract
Date: Wed, 7 Jul 2004 11:17:46 +0100
From: [EMAIL PROTECTED]
( Financial Cryptography Update: The Ricardian Contract )
July 07, 2004
At 07:23 AM 7/5/2004, Anton Stiglic wrote:
Identity has many meanings. In a typical dictionary you will find several
definitions for the word identity. When we are talking about information
systems, we usually talk about a digital identity, which has other meanings
as well. If you are in the
In message [EMAIL PROTECTED], Jason H
olt writes:
[...]
I had the same question about the NSA when some friends were interviewing
there. Apparently investigators will just show up at your house and want to
know all sorts of things about your friends, who you may or may not know to be
in the
Florian Weimer wrote:
* Amir Herzberg:
# Protecting (even) Naïve Web Users, or: Preventing Spoofing and
Establishing Credentials of Web Sites, at
http://www.cs.biu.ac.il/~herzbea/Papers/ecommerce/trusted%20credentials%20area.PDF
The trusted credentials area is an interesting concept.
Thanks.
There was an early attempt to use cryptography to authenticate online
credit card transactions, the SET protocol pushed by Visa and Mastercard
in the late 1990s. SET would require PC users to download a digital
wallet application which would hold cryptographic credentials that
would be used to
I believe that a significant part of the problems discussed here is that
the three concepts named in the subject line are not well-defined. This
is not a question of semantics, it's a question of logical conditions
that are at present overlapping and inconsistent.
For example, much of what is
--- begin forwarded text
Date: Fri, 2 Jul 2004 21:34:20 -0400
From: Dave Emery [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: EZ Pass and the fast lane
User-Agent: Mutt/1.4.1i
Sender: [EMAIL PROTECTED]
Having been inspired by some subversive comments on cypherpunks,
I actually
However, in some scenarios
http://www.garlic.com/~lynn/2001h.html#61
the common use of static data is so pervasive that an individual's
information
is found at thousands of institutions. The value of the information to the
criminal is that the same information can be used to perpetrate fraud
http://www.antaranews.net/en/index.php?id=s6384
Tokyo, July 8 (ANTARA/AFP) - Japanese IT giant Fujitsu Ltd. said Wednesday
it has developed credit card encryption technology which is impossible to
break with existing means
... snip ...
10 matches
Mail list logo