David Chaum

Results: 43



#Item
31

Scantegrity II: End-to-End Verifiability for Optical Scan Election Systems using Invisible Ink Confirmation Codes David Chaum Stefan Popoveniuc§ Richard Carback∗

Add to Reading List

Source URL: users.encs.concordia.ca

Language: English - Date: 2013-08-05 10:55:06
    32Cryptography / Dark web / Cross-platform software / David Chaum / Financial cryptography / Dining cryptographers problem / Anonymous remailer / Tor / Ciphertext / I2P / Anonymity / ElGamal encryption

    Scavenging for Anonymity with BlogDrop Henry Corrigan-Gibbs and Bryan Ford Yale University New Haven, CT, USA Abstract. Anonymous communication schemes that provide strong traffic analysis resistance (e.g., DCnets and M

    Add to Reading List

    Source URL: dedis.cs.yale.edu

    Language: English - Date: 2012-06-25 13:47:28
    33

    Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms By David Chaum Communications of the ACM February 1981 Volume 24

    Add to Reading List

    Source URL: www.cs.utexas.edu

    Language: English - Date: 2005-09-05 20:19:56
      34Notary / Computer security / Digital signature / Non-repudiation / Secure multi-party computation / Key exchange / Data Encryption Standard / David Chaum / Cryptography / Public-key cryptography / Cryptographic protocols

      Davetli Konuşmacılar Director of Sophos Labs, VP SophosLabs & GEO Konu : Threat Landscape Demystified Abstract : Mark Harris will look at the current threat landscape and highlight current trends, such as Blackhat SEO

      Add to Reading List

      Source URL: www.bilgiguvenligi.org.tr

      Language: English - Date: 2013-02-06 12:29:33
      35Cryptography / Onion routing / Tor / Proxy server / Anonymous remailer / David Chaum / Anonymous web browsing / Mix network / I2P / Internet privacy / Computing / Internet

      Communication Privacy and Censorship Resistance Vitaly Shmatikov Privacy on Public Networks • Internet is designed as a public network

      Add to Reading List

      Source URL: www.sti.uniurb.it

      Language: English - Date: 2014-09-11 02:41:52
      36Group signature / David Chaum / Cryptographic nonce / Anonymity / Blind signature / Cryptography / Financial cryptography / Public-key cryptography

      Stuart G. Stubblebine, and Paul F. Syverson. Authentic Attributes with Fine-Grained Anonymity Protection, Financial Cryptography 2000, LNCS Series, Springer-Verlag, 2000. NRL Release Number[removed]Authentic Attr

      Add to Reading List

      Source URL: www.nrl.navy.mil

      Language: English - Date: 2013-04-29 11:50:54
      37Electronic voting / Punchscan / Alan Sherman / Scantegrity / University Voting Systems Competition / David Chaum / Optical scan voting system / Vote counting system / Secret ballot / Politics / Election technology / Elections

      APPROVAL SHEET Title of Thesis: Security Innovations in the Punchscan Voting System Name of Candidate:

      Add to Reading List

      Source URL: www.cisa.umbc.edu

      Language: English - Date: 2008-04-24 18:37:00
      38Computing / Onion routing / Tor / Mixminion / Mix network / Traffic analysis / Anonymous remailer / David Chaum / Routing / Internet privacy / Cryptography / Internet

      Sleeping dogs lie on a bed of onions but wake when mixed Paul Syverson Naval Research Laboratory, USA. Abstract. We introduce and investigate sleeper attacks and explore

      Add to Reading List

      Source URL: www.syverson.org

      Language: English - Date: 2012-03-07 09:26:38
      39Government / Postal voting / Electronic voting / Ballot / Instant-runoff voting / Electoral fraud / Voting system / Voter registration / Voter turnout / Elections / Politics / Voting

      Random-Sample Elections Far lower cost, better quality and more democratic David Chaum

      Add to Reading List

      Source URL: rs-elections.com

      Language: English - Date: 2014-03-15 20:42:14
      40Blind signature / Electronic voting / Dining cryptographers problem / David Chaum / RSA / XTR / Cryptography / Financial cryptography / Public-key cryptography

      LNCS[removed]Elections with Unconditionally-Secret Ballots and Disruption Equivalent to Breaking RSA

      Add to Reading List

      Source URL: www.cs.elte.hu

      Language: English - Date: 2006-03-02 14:49:50
      UPDATE