David A. Wagner

Results: 48



#Item
21Elections / Electoral systems / Election technology / Voter-verified paper audit trail / Electoral fraud / Voting system / Vote counting system / Cryptography / Election recount / Politics / Election fraud / Electronic voting

The Promise of Cryptographic Voting Protocols Chris Karlof Naveen Sastry David Wagner {ckarlof, nks, daw}@cs.berkeley.edu June 6, 2005 Electronic voting has a credibility gap: many experts have sharply criticized current

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:40
22Spamming / Computer crimes / Social engineering / Password / Phishing / HTTP cookie / Cross-site scripting / Email / Malware / Security / Computing / Computer security

Conditioned-safe Ceremonies and a User Study of an Application to Web Authentication Chris Karlof J.D. Tygar David Wagner {ckarlof, tygar, daw}@cs.berkeley.edu

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:40
23Cipher / Differential cryptanalysis / Pointer / Vigenère cipher / Weak key / RC4 / Py / Cryptography / Stream ciphers / Keystream

Security Weaknesses in Maurer-Like Randomized Stream Ciphers Niels Ferguson? , Bruce Schneier?? , and David Wagner? ? ? Abstract. TriStrata appears to have implemented a variation of Maurer’s randomised cipher. We defi

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
24Voluntary Voting System Guidelines / Certification of voting machines / Election Assistance Commission / Electronic voting / Professional certification / Voting system / David A. Wagner / Vote counting system / Usability / Election technology / Politics / Government

P UBLIC C OMMENT ON THE VOTING S YSTEM P ILOT P ROGRAM T ESTING & C ERTIFICATION M ANUAL∗ Submitted to The United States Election Assistance Commission April 26, 2010

Add to Reading List

Source URL: accurate-voting.org

Language: English - Date: 2013-06-05 15:32:08
25Voluntary Voting System Guidelines / Electronic voting / Technical Guidelines Development Committee / ACCURATE / Election Assistance Commission / Voting machine / Usability / Douglas W. Jones / David A. Wagner / Election technology / Politics / Government

Microsoft Word - VVSG Public CommentFinal am).doc

Add to Reading List

Source URL: accurate-voting.org

Language: English - Date: 2013-06-05 15:32:08
26Election fraud / Voting / Electronic voting / Information society / Ballot / Voting machine / Electoral fraud / Visual cryptography / Approval voting / Politics / Cryptography / Elections

Cryptographic Voting Protocols: A Systems Perspective Chris Karlof Naveen Sastry David Wagner {ckarlof, nks, daw}@cs.berkeley.edu University of California, Berkeley

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:40
27Modular arithmetic / M6 / RC5 / ICE / Differential cryptanalysis / Akelarre / RC6 / Linear cryptanalysis / Madryga / Cryptography / Block ciphers / Mod n cryptanalysis

Mod n Cryptanalysis, with Applications Against RC5P and M6 John Kelsey? , Bruce Schneier?? , and David Wagner? ? ? Abstract. We introduce “mod n cryptanalysis,” a form of partitioning attack that is effective against

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
28Keystroke logging / Spyware / Surveillance / Challenge-response authentication / Cryptanalysis / Authentication / Security / Cryptography / Espionage

Cryptanalysis of a Cognitive Authentication Scheme Philippe Golle, PARC David Wagner, UC Berkeley Problem Statement

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:42
29Cross-platform software / Java / CapDesk / Capability-based security / Sandbox / Computer security / Kernel / Computing / Software / System software

A Security Analysis of the Combex DarpaBrowser Architecture David Wagner Dean Tribble March 4, 2002 1 Introduction We describe the results of a limited-time evaluation of the security of the Combex DarpaBrowser, built on

Add to Reading List

Source URL: www.combex.com

Language: English - Date: 2005-08-18 16:59:11
30Cross-platform software / CapDesk / Java / Sandbox / Malware / Confused deputy problem / Computing / System software / Software

A Security Analysis of the Combex DarpaBrowser Architecture David Wagner Dean Tribble March 4, 2002

Add to Reading List

Source URL: www.combex.com

Language: English - Date: 2005-08-18 16:59:23
UPDATE