-
Recent Posts
Recent Comments
- Riccardo Scandariato on The Axiomatic Method and Security Metrics
- Stephan Neuhaus on Stats Tip #3: Bonferroni? No Thanks, I Don’t Like Pasta!
- Stefano on Stats Tip #3: Bonferroni? No Thanks, I Don’t Like Pasta!
- Mahdi Asadpour on Why Next-Generation Internet Security Requires Collaboration
- Martin Burkhart on CSG on Swiss TV
Archives
Categories
Meta
Category Archives: Security
Johnny Still Can’t Encrypt
There once was a very good article about user interface issues in PGP 5.0, called “Why Johnny Can’t Encrypt“. In this year’s Usenix Security Symposium (Simply called “Security” by those in the know), there was an article called “Why (Special … Continue reading
Posted in Security
Leave a comment
Collaborative Network Troubleshooting in Practice
In my last article, I discussed the theoretical benefits of MPC for collaborative network security and how basic MPC primitves can be optimized for practical performance. In the last article of this series for now, I’d like to report on … Continue reading
Posted in Security
Leave a comment
Enabling Cooperative Network Security with MPC
In my last articles, I argued that next-generation Internet security requires collaboration and that privacy concerns are the main road block for such cooperative solutions. I’ve also discussed network trace anonymization as a potential solution to the privacy issues with … Continue reading
Posted in Security
Leave a comment
Setbacks on the Road to Collaborative Network Security
In my last article, I discussed why collaboration among networks is essential for monitoring the Internet and maintaining its security in the future. Unfortunately, such collaboration is very difficult in practice due to privacy concerns.
Posted in Security
Leave a comment
Why Next-Generation Internet Security Requires Collaboration
In the fable “The Blind Men and the Elephant” by the American poet John Godfrey Saxe, six blind men from Indostan heard of a thing called “an elephant” but did not know what it was. To satisfy their minds, they … Continue reading