Media Summary: Ronald Rivest, Massachusetts Institute of Technology Twenty years ago, law enforcement organizations lobbied to require data ... Zachary Peterson, Assistant Professor, Cal Poly, San Luis Obispo Year after year, we see reports on an ever increasing gap, both ... Eva Galperin, Electronic Frontier Foundation Morgan Marquis-Boire, Citizen Lab, University of Toronto Protecting high-risk ...
Usenix Enigma 2016 Keys Under Doormats Mandating Insecurity - Detailed Analysis & Overview
Ronald Rivest, Massachusetts Institute of Technology Twenty years ago, law enforcement organizations lobbied to require data ... Zachary Peterson, Assistant Professor, Cal Poly, San Luis Obispo Year after year, we see reports on an ever increasing gap, both ... Eva Galperin, Electronic Frontier Foundation Morgan Marquis-Boire, Citizen Lab, University of Toronto Protecting high-risk ... Adrienne Porter Felt, Staff Software Engineer, Google Chrome Everyone wants to build software that's both usable and secure, yet ... Damon McCoy, New York University There is a thriving ecosystem of online counterfeit websites that utilize abusive spam based ... Matthew Smith, Professor, University of Bonn, Germany Many aspects of information security combine technical and human ...
Jon Oberheide, Co-Founder and CTO, Duo Security When you think about security and usability, IT is probably not the first thing to ... The 15 respected security experts who authored " Peter Eckersley and Yan Zhu, Electronic Frontier Foundation You would think that encrypting Internet protocols would be a simple ... Nick Sullivan, Security Engineering Lead, CloudFlare There's a lot of fuss about the best way to visually show how secure your ... Breaking Trust – Shades of Crisis Across an Why Is Our Security Research Failing? Five Practices to Change! Marcus Botacin, Texas A&M University Everybody complains ...
Emily McReynolds, Tech Policy Lab, University of Washington As people and companies bring more devices that are "always on" ... Benjamin Brown, Akamai Technologies The hardest part of cybercrime is the cashout. The strategy for cashing out needs to be ...