Bonneau

Results: 161



#Item
91Software / Bitcoin / Peer-to-peer computing / Namespace / Domain name / Name server / Peer-to-peer / Domain / Email / Computing / Domain name system / Network architecture

An empirical study of Namecoin and lessons for decentralized namespace design Harry Kalodner* , Miles Carlsten* , Paul Ellenbogen* , Joseph Bonneau† , Arvind Narayanan* * {kalodner,carlsten,pe5,arvindn}@cs.princeton.ed

Add to Reading List

Source URL: randomwalker.info

Language: English - Date: 2015-05-21 14:09:37
92HTTP / Cryptographic protocols / Key management / Public-key cryptography / Secure communication / HTTP Strict Transport Security / HTTP Secure / Transport Layer Security / HTTP cookie / Software / Cryptography / Computing

Upgrading HTTPS in Mid-Air: An Empirical Study of Strict Transport Security and Key Pinning Michael Kranch Joseph Bonneau

Add to Reading List

Source URL: www.internetsociety.org

Language: English - Date: 2015-02-07 12:44:05
93Peer-to-peer computing / Cryptography / Payment systems / Financial cryptography / Hashing / Computing / Software / Bitcoin

SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies Joseph Bonneau∗†‡ , Andrew Miller§ , Jeremy Clark¶ , Arvind Narayanan∗ , Joshua A. Kroll∗ , Edward W. Felten∗ University, † Stan

Add to Reading List

Source URL: www.cs.princeton.edu

Language: English - Date: 2015-03-23 16:23:28
94Public-key cryptography / Key management / Man-in-the-middle attack / Secure messaging / Public key infrastructure / ZRTP / Secure communication / S/MIME / Digital signature / Cryptography / Cryptographic protocols / Internet privacy

SoK: Secure Messaging1 Nik Unger∗ , Sergej Dechand† Joseph Bonneau‡§ , Sascha Fahl¶ , Henning Perl¶ Ian Goldberg∗ , Matthew Smith† ∗

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2015-04-14 13:29:35
95Cryptographic protocols / Key management / Secure communication / HTTP Strict Transport Security / HTTP Secure / HTTP cookie / Public key certificate / Certificate authority / Transport Layer Security / Cryptography / Public-key cryptography / HTTP

S-links: Why distributed security policy requires secure introduction Joseph Bonneau Google Inc. Abstract—In this paper we argue that secure introduction

Add to Reading List

Source URL: w2spconf.com

Language: English - Date: 2013-05-23 04:10:01
96Identity management / Cryptographic software / Federated identity / Cryptography / Password / OTPW / Single sign-on / Two-factor authentication / One-time password / Security / Computer security / Access control

The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes∗ Joseph Bonneau University of Cambridge Cambridge, UK

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2012-03-19 13:28:32
97Bonneau / Painting / Art

PDF Document

Add to Reading List

Source URL: www.nanaimoartgallery.com

Language: English - Date: 2013-01-31 22:10:12
98Filesystem permissions / Internet privacy / Facebook / Rm / Ls / Umask / Computing / Software / Web 2.0

Poster: Clarity of Facebook Connect login permissions Nicky Robinson 1. Joseph Bonneau

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2014-07-06 08:47:40
99

scIence Des mATÉRIAux propriétés de couches magnétiques à anisotropie en hélice M. GLoaneC - s. dubourG - F. duverGer - d. PLessis - a. bonneau-brauLT / cea − le ripault

Add to Reading List

Source URL: www-physique-chimie.cea.fr

Language: French - Date: 2013-09-05 09:55:02
    100Filesystem permissions / Computer security / Internet privacy / Social networking service / Facebook features / Rm / Umask / Chmod / Computing / Security / Access control

    Cognitive disconnect: Understanding Facebook Connect login permissions WORKING DRAFT Nicky Robinson Joseph Bonneau

    Add to Reading List

    Source URL: jbonneau.com

    Language: English - Date: 2014-06-09 19:21:34
    UPDATE