变形
发表于 2025-3-26 21:48:30
Getting Security Objectives Wrong: A Cautionary Tale of an Industrial Control System (Transcript ofkinds of things that can go wrong, I used Shodan to search for an existing Industrial Control System connected to the Internet. I gave my first version of this talk in March 2016, and have given it a couple of times in the interim. Each time I prepared for the talk, I revisited the ICS, and each tim
明智的人
发表于 2025-3-27 03:57:18
,Assuring the Safety of Asymmetric Social Protocols,, Nigerian scams and the like) is carried out by abusing social protocols—that is to say, computer-mediated interactions between human subjects. We call a social protocol “asymmetric” when the initial sender benefits from execution of the protocol but the recipient is not guaranteed against dishones
哑巴
发表于 2025-3-27 07:31:44
http://reply.papertrans.cn/87/8635/863428/863428_33.png
大都市
发表于 2025-3-27 12:12:27
http://reply.papertrans.cn/87/8635/863428/863428_34.png
nerve-sparing
发表于 2025-3-27 14:34:44
http://reply.papertrans.cn/87/8635/863428/863428_35.png
附录
发表于 2025-3-27 20:08:26
Making Decryption Accountable,. We describe a protocol that forces decryptors to create such information. The information can’t be discarded or suppressed without detection. The protocol relies on a trusted hardware device. We describe some applications.
Trigger-Point
发表于 2025-3-28 01:41:17
Making Decryption Accountable (Transcript of Discussion),t tell my parents where I was going because I wanted my privacy. But my parents naturally wanted to make sure that they’d have some recourse if I don’t come back at the expected time. They wanted security in other words. We hit upon a compromise whereby I would put my plans in an envelope, and leave
大厅
发表于 2025-3-28 05:43:48
http://reply.papertrans.cn/87/8635/863428/863428_38.png
种属关系
发表于 2025-3-28 07:30:29
Key Exchange with the Help of a Public Ledger,stency property to detect and prevent man-in-the-middle attacks in a key exchange such as Diffie-Hellman or ECDH. Essentially, the MitM attack creates an inconsistency in the world views of the two honest parties, and they can detect it with the help of the ledger. Thus, there is no need for prior k
optic-nerve
发表于 2025-3-28 11:07:51
,Reconciling Multiple Objectives – Politics or Markets?,ems. At the deepest level, security protocols determine the power structure of a system: who can do what with whom. The development, adoption, spread and evolution of protocols, and competition between them, are both political and economic activities. They may reconcile multiple objectives or be the