Zobrazeno 1 - 10
of 52
pro vyhledávání: '"Smyth, Ben"'
Autor:
Kharman, Aida Manzano, Smyth, Ben
DAO Governance is currently broken. We survey the state of the art and find worrying conclusions. Vote buying, vote selling and coercion are easy. The wealthy rule, decentralisation is a myth. Hostile take-overs are incentivised. Ballot secrecy is no
Externí odkaz:
http://arxiv.org/abs/2406.08605
We formalise definitions of ballot secrecy and ballot independence by Smyth, JCS'21 as indistinguishability games in the computational model of security. These definitions improve upon Smyth, draft '21 to consider a wider class of voting systems. Bot
Externí odkaz:
http://arxiv.org/abs/2311.12977
M2M devices are ubiquitous, and there is a growing tendency to connect such devices to mobile networks. Network operators are investigating new solutions to lower their costs and to address usability issues. Embedded SIM cards with remote provisionin
Externí odkaz:
http://arxiv.org/abs/1906.02254
TLS 1.3 for engineers: An exploration of the TLS 1.3 specification and OpenJDK's Java implementation
Autor:
Smyth, Ben
The Internet delivered in excess of forty terabytes per second in 2017 (Cisco, 2018), and over half of today's Internet traffic is encrypted (Sandvine, 2018); enabling trade worth trillions of dollars (Statista, 2017). Yet, the underlying encryption
Externí odkaz:
http://arxiv.org/abs/1904.02148
Autor:
Quaglia, Elizabeth A., Smyth, Ben
We explore the fundamental properties that are necessary to ensure that election schemes behave as expected. The exploration reveals how our understanding of those expectations has evolved, culminating in the emergence of formal definitions of proper
Externí odkaz:
http://arxiv.org/abs/1702.03168
Autor:
Meyer, Maxime, Smyth, Ben
Election systems must ensure that representatives are chosen by voters. Moreover, each voter should have equal influence. Traditionally, this has been achieved by permitting voters to cast at most one ballot. More recently, this has been achieved by
Externí odkaz:
http://arxiv.org/abs/1612.04099
Autor:
Smyth, Ben
Cryptographic protocols form the backbone of our digital society. Unfortunately, the security of numerous critical components has been neglected. As a consequence, attacks have resulted in financial loss, violations of personal privacy, and threats t
Externí odkaz:
https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.535277
Autor:
Smyth, Ben1 (AUTHOR) research@bensmyth.com
Publikováno v:
Journal of Computer Security. 2021, Vol. 29 Issue 6, p551-611. 61p.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Smyth, Ben, Clarkson, Michael R.
Publikováno v:
In Information Processing Letters August 2022 177