PORTIA workshop on sensitive data, July 8-9, 2004, Stanford Univ.

2004-07-08 Thread Perry E. Metzger
Date: Mon, 5 Jul 2004 13:29:39 -0400 (EDT) From: [EMAIL PROTECTED] To: [EMAIL PROTECTED] Subject: PORTIA workshop on sensitive data, July 8-9, 2004, Stanford Univ. The final workshop program is available at http://crypto.stanford.edu/portia/workshops/2004_7_prog.html Some potential

The Ricardian Contract - using mundane cryptography to achieve powerful governance

2004-07-08 Thread Ian Grigg
Original Message Subject: Financial Cryptography Update: The Ricardian Contract Date: Wed, 7 Jul 2004 11:17:46 +0100 From: [EMAIL PROTECTED] ( Financial Cryptography Update: The Ricardian Contract ) July 07, 2004

RE: authentication and authorization (was: Question on the state of the security industry)

2004-07-08 Thread Anne Lynn Wheeler
At 07:23 AM 7/5/2004, Anton Stiglic wrote: Identity has many meanings. In a typical dictionary you will find several definitions for the word identity. When we are talking about information systems, we usually talk about a digital identity, which has other meanings as well. If you are in the

Re: Question on the state of the security industry (second half not necessarily on topic)

2004-07-08 Thread Steven M. Bellovin
In message [EMAIL PROTECTED], Jason H olt writes: [...] I had the same question about the NSA when some friends were interviewing there. Apparently investigators will just show up at your house and want to know all sorts of things about your friends, who you may or may not know to be in the

Re: Using crypto against Phishing, Spoofing and Spamming...

2004-07-08 Thread Amir Herzberg
Florian Weimer wrote: * Amir Herzberg: # Protecting (even) Naïve Web Users, or: Preventing Spoofing and Establishing Credentials of Web Sites, at http://www.cs.biu.ac.il/~herzbea/Papers/ecommerce/trusted%20credentials%20area.PDF The trusted credentials area is an interesting concept. Thanks.

Re: Using crypto against Phishing, Spoofing and Spamming...

2004-07-08 Thread Hal Finney
There was an early attempt to use cryptography to authenticate online credit card transactions, the SET protocol pushed by Visa and Mastercard in the late 1990s. SET would require PC users to download a digital wallet application which would hold cryptographic credentials that would be used to

identification + Re: authentication and authorization

2004-07-08 Thread Ed Gerck
I believe that a significant part of the problems discussed here is that the three concepts named in the subject line are not well-defined. This is not a question of semantics, it's a question of logical conditions that are at present overlapping and inconsistent. For example, much of what is

EZ Pass and the fast lane ....

2004-07-08 Thread R. A. Hettinga
--- begin forwarded text Date: Fri, 2 Jul 2004 21:34:20 -0400 From: Dave Emery [EMAIL PROTECTED] To: [EMAIL PROTECTED] Subject: EZ Pass and the fast lane User-Agent: Mutt/1.4.1i Sender: [EMAIL PROTECTED] Having been inspired by some subversive comments on cypherpunks, I actually

RE: authentication and authorization (was: Question on the state of the security industry)

2004-07-08 Thread Anton Stiglic
However, in some scenarios http://www.garlic.com/~lynn/2001h.html#61 the common use of static data is so pervasive that an individual's information is found at thousands of institutions. The value of the information to the criminal is that the same information can be used to perpetrate fraud

FUJITSU DEVELOPS ENCRYPTION TECH THAT TAKES 20 MILLION YEARS TO BREAK

2004-07-08 Thread Anne Lynn Wheeler
http://www.antaranews.net/en/index.php?id=s6384 Tokyo, July 8 (ANTARA/AFP) - Japanese IT giant Fujitsu Ltd. said Wednesday it has developed credit card encryption technology which is impossible to break with existing means ... snip ...