... and has now made slashdot
Chip & PIN Terminal Playing Tetris
http://hardware.slashdot.org/hardware/07/01/08/1355221.shtml
previous post
http://www.garlic.com/~lynn/aadsm26.htm#20 Tamperproof, yet playing Tetris
recent related comments
http://www.garlic.com/~lynn/aadsm26.htm#21 FC07 Pre
From: Rachna Dhamija <[EMAIL PROTECTED]>
Subject: [fc-announce] Usable Security--Prelim Program--Jan 8 Hotel Deadline
To: [EMAIL PROTECTED]
Date: Fri, 5 Jan 2007 11:45:31 -0800
Below is the preliminary program for Usable Security, a workshop that
will be held in conjunction with FC07. Note that
From: Sven Dietrich <[EMAIL PROTECTED]>
Subject: [fc-announce] FC07: Preliminary program and call for participation
To: [EMAIL PROTECTED]
Date: Mon, 8 Jan 2007 08:08:09 -0500 (EST)
Dear Colleague,
Please see below for the preliminary program and call for participation for
Financial Cryptogra
Adam Back wrote:
> About the criticisms of Common Critera evaluation in general, I think
> why people complain it is a documentation exercise is because pretty
> much all it does ensure that it does what it says it does. So
> basically you have to enumerates threats, state what threats the
> syste
On 1/6/07, Allen <[EMAIL PROTECTED]> wrote:
One of the questions that I have been raising is trust and how to
ensure that that it is not misplaced or eroded over time. Which
leads me to my question for the list: I can see easily how to do
split key for 2 out of x for key recovery, but I can't see
I think you are looking for the m of n solution, or commonly known as
shared secret which can be implemented using shamir's or blakley's
scheme.
you can find a open source implementation of shamir's scheme @
http://point-at-infinity.org//
or more info check out the wikipedia entry:
http://en
Allen wrote:
> One of the questions that I have been raising is trust and how to ensure
> that that it is not misplaced or eroded over time. Which leads me to my
> question for the list: I can see easily how to do split key for 2 out of
> x for key recovery, but I can't seem to find a reference to
On Sat, 06 Jan 2007 13:13:32 -0800
Allen <[EMAIL PROTECTED]> wrote:
> Hi everyone,
>
> I'm Allen Schaaf and I'm primarily an information security analyst -
> I try to look at things like a total stranger and ask all the dumb
> questions hoping to stumble on one or two that hadn't been asked
> bef