منابع مشابه
Towards More Sensible Anti-circumvention Regulations
The circumvention of technical protection systems and the making of tools to enable such circumventions may seem to financial cryptographers a wholly natural and constructive set of activities. This community knows that it is impossible to make encryption systems more secure unless one tests how strong they are from time to time by trying to break them. However, now that other industries, notab...
متن کاملCircumvention of fingerprint scanners
One critical issue regarding the protection of confidential information or valuable items is to determine the identity of a person. Biometrics is supposed to offer this security in a user-friendly and secure way. One problem however is that there are ways to compromise systems based on biometric verification. Some of these biometrical features have known vulnerabilities. Persons with similar fa...
متن کاملTor’s Usability for Censorship Circumvention
Tor has grown beyond its original purpose as and has since become an important Internet circumvention tool. We specifically examine it usability as a censorship circumvention tool, an essential facet for adoption and use. We focus our analysis on the connection configuration dialog of Tor browser, as censorship circumvention requires correct transport configurations. Our talk will describe a fu...
متن کاملSalmon: Robust Proxy Distribution for Censorship Circumvention
Many governments block their citizens’ access to much of the Internet. Simple workarounds are unreliable; censors quickly discover and patch them. Previously proposed robust approaches either have non-trivial obstacles to deployment, or rely on lowperformance covert channels that cannot support typical Internet usage such as streaming video. We present Salmon, an incrementally deployable system...
متن کاملRandomizing Security Activities with Attacker Circumvention Strategies
Game theoretic methods for making resource allocation decision in security domains have attracted growing attention from both researchers and security practitioners, including deployed applications at both the LAX airport and the Federal Air Marshals Service. We develop a new class of security games designed to model decisions faced by the Transportation Security Administration and other agenci...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Technology and Society Magazine
سال: 2003
ISSN: 0278-0097
DOI: 10.1109/mtas.2003.1216242