Zobrazeno 1 - 10
of 114
pro vyhledávání: '"Ted Selker"'
Publikováno v:
Interaction Design and Architecture(s), Iss 26, Pp 3-5 (2015)
Externí odkaz:
https://doaj.org/article/55f49060ed824ad6b7fbb5ec28adc34b
We present Phrase-Verified Voting, a voter-verifiable remote voting system assembled from commercial off-the-shelf software for small private elections. The system is transparent and enables each voter to verify that the tally includes their ballot s
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::053c774eb432e58ea31811276337180f
https://hal.science/hal-03164487
https://hal.science/hal-03164487
Publikováno v:
CHI Extended Abstracts
CHI Conference on Human Factors in Computing Systems
CHI Conference on Human Factors in Computing Systems, Apr 2020, Honolulu, United States. ⟨10.1145/3334480.3382990⟩
CHI Conference on Human Factors in Computing Systems
CHI Conference on Human Factors in Computing Systems, Apr 2020, Honolulu, United States. ⟨10.1145/3334480.3382990⟩
International audience; Reliance on technology has diminished our use of mental computation. However, mental computation's inherent privacy features are becoming central to new research on creating more secure and usable passwords than one gets with
Autor:
Ted Selker, Enka Blanchard
Publikováno v:
FC 2020-5th Workshop on Advances in Secure Electronic Voting
FC 2020-5th Workshop on Advances in Secure Electronic Voting, Feb 2020, Kota Kinabalu, Malaysia
Financial Cryptography and Data Security ISBN: 9783030544546
Financial Cryptography Workshops
FC 2020-5th Workshop on Advances in Secure Electronic Voting, Feb 2020, Kota Kinabalu, Malaysia
Financial Cryptography and Data Security ISBN: 9783030544546
Financial Cryptography Workshops
International audience; Over the past four decades, fear of election manipulation and hacking has spurred the security technology community to propose a variety of voting systems to implement verifiable voting. Most of these rely on hard to understan
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::9cbe7e4348f053440b1545cf36f7c1c7
https://hal.archives-ouvertes.fr/hal-02550738/file/blanchard-2020-origamivotingnon.pdf
https://hal.archives-ouvertes.fr/hal-02550738/file/blanchard-2020-origamivotingnon.pdf
Publikováno v:
COMPSAC
People struggle to invent safe passwords for many of their typical online activities, leading to a variety of security problems when they use overly simple passwords or reuse them multiple times with minor modifications. Having different passwords fo
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::fcfa18c20c75d7345f7335f023fa1b3f
https://hal.archives-ouvertes.fr/hal-01781231v2
https://hal.archives-ouvertes.fr/hal-01781231v2
Publikováno v:
Emerging Technologies for Authorization and Authentication
Emerging Technologies for Authorization and Authentication, 11967, pp.104-121, 2019, ⟨10.1007/978-3-030-39749-4_7⟩
Lecture Notes in Computer Science ISBN: 9783030397487
ETAA@ESORICS
Emerging Technologies for Authorization and Authentication, 11967, pp.104-121, 2019, ⟨10.1007/978-3-030-39749-4_7⟩
Lecture Notes in Computer Science ISBN: 9783030397487
ETAA@ESORICS
International audience; Today’s biometric authentication systems are still struggling with replay attacks and irrevocable stolen credentials. This paper introduces a biometric protocol that addresses such vulnerabilities. The approach prevents iden
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::6d2c349db558cfbb1d939415d093589c
https://hal.science/hal-02550765
https://hal.science/hal-02550765
Publikováno v:
HCI for Cybersecurity, Privacy and Trust ISBN: 9783030223502
HCI (29)
HCI International
HCI International, Jul 2019, Orlando, United States
BASE-Bielefeld Academic Search Engine
HCI (29)
HCI International
HCI International, Jul 2019, Orlando, United States
BASE-Bielefeld Academic Search Engine
International audience; Recent work on passwords has focused on choosing secure codes, while design for ability to type them error-free has not received as much attention. The difficulties people were having transcribing codes in a security demonstra
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::687ab45c4116dc6af3d9c3962b816eaa
https://doi.org/10.1007/978-3-030-22351-9_2
https://doi.org/10.1007/978-3-030-22351-9_2
Publikováno v:
9th International Workshop on Socio-Technical Aspects in SecuriTy
9th International Workshop on Socio-Technical Aspects in SecuriTy, Sep 2019, Luxembourg Ville, Luxembourg
Lecture Notes in Computer Science ISBN: 9783030559571
STAST
9th International Workshop on Socio-Technical Aspects in SecuriTy, Sep 2019, Luxembourg Ville, Luxembourg
Lecture Notes in Computer Science ISBN: 9783030559571
STAST
International audience; Credential leaks still happen with regular frequency, and show evidence that, despite decades of warnings, password hashing is still not correctly implemented in practice. The common practice today , inherited from previous bu
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::85179a8c1e5c83c2524ce50a6c84da58
https://hal-univ-paris8.archives-ouvertes.fr/hal-02560695
https://hal-univ-paris8.archives-ouvertes.fr/hal-02560695
Autor:
Ted Selker, Nikola K. Blanchard
Publikováno v:
STAST
Experience shows that the best technology is not always adopted. In the security arena no technology has to stand a harder challenge or has higher consequences for changing society by failure than voting technology. Best technology in voting is defin
Publikováno v:
Proceedings of the 34th Annual Computer Security Applications Conference
Annual Computer Security Applications Conference (ACSAC)
Annual Computer Security Applications Conference (ACSAC), Dec 2018, San Juan, Puerto Rico. ⟨10.1145/3274694.3274734⟩
ACSAC
Annual Computer Security Applications Conference (ACSAC)
Annual Computer Security Applications Conference (ACSAC), Dec 2018, San Juan, Puerto Rico. ⟨10.1145/3274694.3274734⟩
ACSAC
International audience; Passphrases have many uses, such as serving as seeds for passwords. User-created passphrases are easier to remember, but tend to be less secure than ones created from words randomly chosen in a dictionary. This paper develops
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::04ed034142108d316fcd7f03c5f9978a
https://hal.archives-ouvertes.fr/hal-01781233
https://hal.archives-ouvertes.fr/hal-01781233