Security through obscurity

Results: 21



#Item
11Human rights / Internet ethics / Virtual reality / Social information processing / Internet privacy / Privacy / Social networking service / Security through obscurity / Internet / Ethics / Technology / Computing

The Case for Online Obscurity

Add to Reading List

Source URL: fredstutzman.com.s3.amazonaws.com

Language: English - Date: 2013-05-15 17:12:20
12Organizational theory / Proactivity / Defence in depth / Security through obscurity / SecurID / Force concentration / Computer security / Military science / Security / National security

A Learning-Based Approach to Reactive Security Adam Barth1 , Benjamin I. P. Rubinstein1 , Mukund Sundararajan3 , John C. Mitchell4 , Dawn Song1 , and Peter L. Bartlett1,2 1 Computer Science Division 2 Department of Stat

Add to Reading List

Source URL: www.adambarth.com

Language: English - Date: 2010-01-24 14:10:18
13Internet ethics / Human rights / Internet privacy / Cryptography / Secrecy / Security through obscurity / Privacy / Online identity / Anonymity / Ethics / World Wide Web / Computing

THE CASE FOR ONLINE OBSCURITY Woodrow Hartzog* and Frederic Stutzman** ABSTRACT: On the Internet, obscure information has a minimal risk of being discovered or understood by unintended recipients. Empirical research demo

Add to Reading List

Source URL: www.futureofprivacy.org

Language: English - Date: 2011-09-30 13:02:58
14Election fraud / Cyberwarfare / Computer network security / Information society / Software testing / Voter-verified paper audit trail / Vulnerability / Voting machine / Security through obscurity / Electronic voting / Politics / Computer security

Microsoft Word - Red_Overview-after2.doc

Add to Reading List

Source URL: www.sos.ca.gov

Language: English - Date: 2011-05-14 16:39:28
15Information society / Election technology / Hart InterCivic / Premier Election Solutions / Vote counting system / Security through obscurity / Ballot / Politics / Electronic voting / Technology

Executive Summary The California Secretary of State entered into a contract with the University of California to test the security of three electronic voting systems as part of her Top to Bottom Review. Each Red Team was

Add to Reading List

Source URL: www.sos.ca.gov

Language: English - Date: 2011-05-14 16:39:41
16Computer network security / Data security / National security / Vulnerability / Information security / IT risk / Security through obscurity / Internet privacy / Threat / Security / Computer security / Cyberwarfare

Workshop on Information Security Economics∗ Date of workshop: January 18–19, 2007 Workshop Organizers: Jean Camp, Indiana University [removed] Alessandro Acquisti, Carnegie Mellon University

Add to Reading List

Source URL: dimacs.rutgers.edu

Language: English - Date: 2008-02-29 09:44:53
17Computer security / Cisco Systems / Network security / Cisco IOS / Security controls / Virtual LAN / Security through obscurity / Virtual private network / Cisco Career Certifications / Computer network security / Computing / Security

SECURE ENTERPRISE DESIGN SESSION SEC-2000 SEC-2000 9847_05_2004_c2

Add to Reading List

Source URL: seanconvery.com

Language: English - Date: 2009-03-20 22:07:48
18Law / Computer law / Proprietary software / Eben Moglen / Security through obscurity / GNU General Public License / Computer security / Free Software Foundation / Patch / Free software / Software licenses / Software

Free Software Matters: Security Through Freedom Eben Moglen∗ June 15, 2002 S

Add to Reading List

Source URL: moglen.law.columbia.edu

Language: English - Date: 2003-01-18 20:29:12
19Law / Computer law / Proprietary software / Eben Moglen / Security through obscurity / GNU General Public License / Computer security / Free Software Foundation / Patch / Free software / Software licenses / Software

Free Software Matters: Security Through Freedom Eben Moglen∗ June 15, 2002 S

Add to Reading List

Source URL: emoglen.law.columbia.edu

Language: English - Date: 2003-01-18 20:29:12
20Steganography / Block cipher modes of operation / Cipher / Encryption software / Digital watermarking / Block cipher / Symmetric-key algorithm / Initialization vector / One-time pad / Cryptography / Espionage / Cryptographic software

SECURITY THROUGH OBSCURITY

Add to Reading List

Source URL: www.rootsecure.net

Language: English - Date: 2005-05-30 14:00:23
UPDATE