David Wagner

Results: 270



#Item
161Computing / Security / Internet protocols / Electronic commerce / Internet standards / Transport Layer Security / Cipher suite / Chosen-ciphertext attack / Man-in-the-middle attack / Cryptography / Secure communication / Cryptographic protocols

Analysis of the SSL 3.0 protocol David Wagner University of California, Berkeley Bruce Schneier

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
162Linear cryptanalysis / Weak key / Chosen-plaintext attack / Cryptanalysis / Ciphertext / Advanced Encryption Standard / FROG / Differential-linear attack / Running key cipher / Cryptography / Differential cryptanalysis / Advantage

Cryptanalysis of FROG David Wagner∗ Niels Ferguson† Bruce Schneier‡

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
163Government / Electronic voting / Voting machine / Ballot / Optical scan voting system / Help America Vote Act / Postal voting / Absentee ballot / DRE voting machine / Politics / Elections / Voting

Prerendered User Interfaces for Higher-Assurance Electronic Voting Ka-Ping Yee∗ David Wagner∗ Marti Hearst∗

Add to Reading List

Source URL: zesty.ca

Language: English - Date: 2014-12-11 14:48:00
164Voluntary Voting System Guidelines / Certification of voting machines / Election Assistance Commission / Electronic voting / Professional certification / Voting system / David A. Wagner / Vote counting system / Usability / Election technology / Politics / Government

P UBLIC C OMMENT ON THE VOTING S YSTEM P ILOT P ROGRAM T ESTING & C ERTIFICATION M ANUAL∗ Submitted to The United States Election Assistance Commission April 26, 2010

Add to Reading List

Source URL: accurate-voting.org

Language: English - Date: 2013-06-05 15:32:08
165Voluntary Voting System Guidelines / Electronic voting / Technical Guidelines Development Committee / ACCURATE / Election Assistance Commission / Voting machine / Usability / Douglas W. Jones / David A. Wagner / Election technology / Politics / Government

Microsoft Word - VVSG Public CommentFinal am).doc

Add to Reading List

Source URL: accurate-voting.org

Language: English - Date: 2013-06-05 15:32:08
166Election fraud / Voting / Electronic voting / Information society / Ballot / Voting machine / Electoral fraud / Visual cryptography / Approval voting / Politics / Cryptography / Elections

Cryptographic Voting Protocols: A Systems Perspective Chris Karlof Naveen Sastry David Wagner {ckarlof, nks, daw}@cs.berkeley.edu University of California, Berkeley

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:40
167Embedded Linux / Smartphones / Filesystem permissions / Instant messaging / Internet privacy / Privilege / Facebook / Software / Computing / Android

Android Permissions: User Attention, Comprehension, and Behavior Adrienne Porter Felt*, Elizabeth Ha† , Serge Egelman*, Ariel Haney† , Erika Chin*, David Wagner* *Computer Science Department †School of Information

Add to Reading List

Source URL: www.eecs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:39
168Computing / Electronic voting / Electoral fraud / Denial-of-service attack / Botnet / Malware / Federal Voting Assistance Program / HTTP cookie / Attack / Computer network security / Cyberwarfare / Computer security

By David Jefferson, Aviel D. Rubin, Barbara Simons, AND David Wagner ANALYZING INTERNET VOTING SECURITY

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:40
169Modular arithmetic / M6 / RC5 / ICE / Differential cryptanalysis / Akelarre / RC6 / Linear cryptanalysis / Madryga / Cryptography / Block ciphers / Mod n cryptanalysis

Mod n Cryptanalysis, with Applications Against RC5P and M6 John Kelsey? , Bruce Schneier?? , and David Wagner? ? ? Abstract. We introduce “mod n cryptanalysis,” a form of partitioning attack that is effective against

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
170Network architecture / Computing / Routing protocols / Wireless sensor network / Routing / Wireless ad-hoc network / Multipath routing / Flooding / Geographic routing / Wireless networking / Routing algorithms / Technology

Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof David Wagner University of California at Berkeley ckarlof,daw @cs.berkeley.edu

Add to Reading List

Source URL: webs.cs.berkeley.edu

Language: English - Date: 2003-01-26 22:39:21
UPDATE