Media Summary: Ronald Rivest, Massachusetts Institute of Technology Twenty years ago, law enforcement organizations lobbied to require data ... Zachary Peterson, Assistant Professor, Cal Poly, San Luis Obispo Year after year, we see reports on an ever increasing gap, both ... Eva Galperin, Electronic Frontier Foundation Morgan Marquis-Boire, Citizen Lab, University of Toronto Protecting high-risk ...

Usenix Enigma 2016 Keys Under Doormats Mandating Insecurity - Detailed Analysis & Overview

Ronald Rivest, Massachusetts Institute of Technology Twenty years ago, law enforcement organizations lobbied to require data ... Zachary Peterson, Assistant Professor, Cal Poly, San Luis Obispo Year after year, we see reports on an ever increasing gap, both ... Eva Galperin, Electronic Frontier Foundation Morgan Marquis-Boire, Citizen Lab, University of Toronto Protecting high-risk ... Adrienne Porter Felt, Staff Software Engineer, Google Chrome Everyone wants to build software that's both usable and secure, yet ... Damon McCoy, New York University There is a thriving ecosystem of online counterfeit websites that utilize abusive spam based ... Matthew Smith, Professor, University of Bonn, Germany Many aspects of information security combine technical and human ...

Jon Oberheide, Co-Founder and CTO, Duo Security When you think about security and usability, IT is probably not the first thing to ... The 15 respected security experts who authored " Peter Eckersley and Yan Zhu, Electronic Frontier Foundation You would think that encrypting Internet protocols would be a simple ... Nick Sullivan, Security Engineering Lead, CloudFlare There's a lot of fuss about the best way to visually show how secure your ... Breaking Trust – Shades of Crisis Across an Why Is Our Security Research Failing? Five Practices to Change! Marcus Botacin, Texas A&M University Everybody complains ...

Emily McReynolds, Tech Policy Lab, University of Washington As people and companies bring more devices that are "always on" ... Benjamin Brown, Akamai Technologies The hardest part of cybercrime is the cashout. The strategy for cashing out needs to be ...

Photo Gallery

USENIX Enigma 2016 - Keys Under Doormats: Mandating Insecurity...
USENIX Enigma 2016 - A Million Hit Points and Infinite Charisma: How Games Can Fix...
USENIX Enigma 2016 - Protecting High Risk Users
USENIX Enigma 2016 - Why Is Usable Security Hard, and What Should We Do about it?
USENIX Enigma 2016 - Bullet-Proof Credit Card Processing
USENIX Enigma 2016 - Usable Security–The Source Awakens
USENIX Enigma 2016 - Security and Usability from the Frontlines of Enterprise IT
The Impact of Keys Under Doormats: A Conversation with Co-Author Josh Benaloh and Dave Crocker
USENIX Enigma 2016 - Several Horror Stories about the Encrypted Web
USENIX Enigma 2016 - Trust Beyond the First Hop–What Really Happens to Data Sent to HTTPS Websites
USENIX Enigma 2021 - Breaking Trust – Shades of Crisis Across an Insecure Software Supply Chain
USENIX Enigma 2016 Trailer
Sponsored
Sponsored
View Detailed Profile
USENIX Enigma 2016 - Keys Under Doormats: Mandating Insecurity...

USENIX Enigma 2016 - Keys Under Doormats: Mandating Insecurity...

Ronald Rivest, Massachusetts Institute of Technology Twenty years ago, law enforcement organizations lobbied to require data ...

USENIX Enigma 2016 - A Million Hit Points and Infinite Charisma: How Games Can Fix...

USENIX Enigma 2016 - A Million Hit Points and Infinite Charisma: How Games Can Fix...

Zachary Peterson, Assistant Professor, Cal Poly, San Luis Obispo Year after year, we see reports on an ever increasing gap, both ...

Sponsored
USENIX Enigma 2016 - Protecting High Risk Users

USENIX Enigma 2016 - Protecting High Risk Users

Eva Galperin, Electronic Frontier Foundation Morgan Marquis-Boire, Citizen Lab, University of Toronto Protecting high-risk ...

USENIX Enigma 2016 - Why Is Usable Security Hard, and What Should We Do about it?

USENIX Enigma 2016 - Why Is Usable Security Hard, and What Should We Do about it?

Adrienne Porter Felt, Staff Software Engineer, Google Chrome Everyone wants to build software that's both usable and secure, yet ...

USENIX Enigma 2016 - Bullet-Proof Credit Card Processing

USENIX Enigma 2016 - Bullet-Proof Credit Card Processing

Damon McCoy, New York University There is a thriving ecosystem of online counterfeit websites that utilize abusive spam based ...

Sponsored
USENIX Enigma 2016 - Usable Security–The Source Awakens

USENIX Enigma 2016 - Usable Security–The Source Awakens

Matthew Smith, Professor, University of Bonn, Germany Many aspects of information security combine technical and human ...

USENIX Enigma 2016 - Security and Usability from the Frontlines of Enterprise IT

USENIX Enigma 2016 - Security and Usability from the Frontlines of Enterprise IT

Jon Oberheide, Co-Founder and CTO, Duo Security When you think about security and usability, IT is probably not the first thing to ...

The Impact of Keys Under Doormats: A Conversation with Co-Author Josh Benaloh and Dave Crocker

The Impact of Keys Under Doormats: A Conversation with Co-Author Josh Benaloh and Dave Crocker

The 15 respected security experts who authored "

USENIX Enigma 2016 - Several Horror Stories about the Encrypted Web

USENIX Enigma 2016 - Several Horror Stories about the Encrypted Web

Peter Eckersley and Yan Zhu, Electronic Frontier Foundation You would think that encrypting Internet protocols would be a simple ...

USENIX Enigma 2016 - Trust Beyond the First Hop–What Really Happens to Data Sent to HTTPS Websites

USENIX Enigma 2016 - Trust Beyond the First Hop–What Really Happens to Data Sent to HTTPS Websites

Nick Sullivan, Security Engineering Lead, CloudFlare There's a lot of fuss about the best way to visually show how secure your ...

USENIX Enigma 2021 - Breaking Trust – Shades of Crisis Across an Insecure Software Supply Chain

USENIX Enigma 2021 - Breaking Trust – Shades of Crisis Across an Insecure Software Supply Chain

Breaking Trust – Shades of Crisis Across an

USENIX Enigma 2016 Trailer

USENIX Enigma 2016 Trailer

Enigma

USENIX Enigma 2023 - Why Is Our Security Research Failing? Five Practices to Change!

USENIX Enigma 2023 - Why Is Our Security Research Failing? Five Practices to Change!

Why Is Our Security Research Failing? Five Practices to Change! Marcus Botacin, Texas A&M University Everybody complains ...

USENIX Enigma 2018 - Stranger Things: Who’s Listening When the Device Is Always On

USENIX Enigma 2018 - Stranger Things: Who’s Listening When the Device Is Always On

Emily McReynolds, Tech Policy Lab, University of Washington As people and companies bring more devices that are "always on" ...

USENIX Enigma 2016 - Dolla Dolla Bill Y'all: Cybercrime Cashouts

USENIX Enigma 2016 - Dolla Dolla Bill Y'all: Cybercrime Cashouts

Benjamin Brown, Akamai Technologies The hardest part of cybercrime is the cashout. The strategy for cashing out needs to be ...

Keys Under Doormats: Tutorial and Content Review with Co-Author Josh Benaloh

Keys Under Doormats: Tutorial and Content Review with Co-Author Josh Benaloh

... behind the report "

Keys Under Doormats 2015 Falk Award: How and Why the Report was Developed

Keys Under Doormats 2015 Falk Award: How and Why the Report was Developed

... the authors of"