منابع مشابه
Issued for Abuse: Measuring the Underground Trade in Code Signing Certificate
Recent measurements of the Windows code-signing certificate ecosystem have highlighted various forms of abuse that allow malware authors to produce malicious code carrying valid digital signatures. However, the underground trade that allows miscreants to acquire such certificates is not well understood. In this paper, we illuminate two aspects of this trade. First, we investigate 4 leading vend...
متن کاملContract Signing Using PGP
Is it possible to achieve non-repudiation during electronic contractsigning? How can this be achieved in an e-mail based environment? These are the questions we will try to answer. The process of getting these answers will involve a short introduction to some of the available contract-signing standards and an analysis of how well the given standard would work in a e-mail environment. Additional...
متن کاملQuantum contract signing
We present a probabilistic quantum contract signing protocol between two clients that requires no communication with the third trusted party during the commitment (i.e. signature exchange) phase. We discuss its fairness and show that it is possible to design such a protocol for which the probability of a dishonest client to cheat becomes negligible, and scales as N−1/2, where N is the size of t...
متن کاملPoster: Bitcoin Meets Collective Signing
While showing great promise, Bitcoin requires users to wait tens of minutes for transactions to commit – even then offering only probabilistic guarantees. This work introduces ByzCoin, a novel Byzantine consensus protocol that leverages scalable collective signing to commit Bitcoin transactions irreversibly within seconds. ByzCoin achieves Byzantine consensus while preserving Bitcoin’s open mem...
متن کاملAbuse-Free Optimistic Contract Signing
We introduce the notion of abuse-free distributed contract signing, that is, distributed contract signing in which no party ever can prove to a third party that he is capable of choosing whether to validate or invalidate the contract. Assume Alice and Bob are signing a contract. If the contract protocol they use is not abuse-free, then it is possible for one party, say Alice, at some point to c...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Datenschutz und Datensicherheit - DuD
سال: 2012
ISSN: 1614-0702,1862-2607
DOI: 10.1007/s11623-012-0227-y