Random Oracle

Building and breaking systems

Menu
Widgets
Search
Skip to content
  • Home
  • About

Standard Disclaimer

The opinions and views expressed here are my own, and do not reflect those of my employer.
February 2009
M T W T F S S
 1
2345678
9101112131415
16171819202122
232425262728  
« Jan   Jul »
  • Who actually pays for credit card fraud? (part III)
  • Who actually pays for credit card fraud? (part II)
  • Sprints and marathons: why developer interviews miss the mark
  • Relics from the P2P file-sharing wars
  • Second-guessing Satoshi: ECDSA vs RSA? (part III)
  • Getting by without passwords: disk encryption
  • Future-proofing software updates: Global Platform and lessons from FBiOS (part III)
  • Getting by without passwords: LUKS with smart-cards (part II)
  • Bitcoin's meta problem: governance (part I)
  • Getting by without passwords: encrypted email

Standard Disclaimer

The opinions and views expressed here are my own, and do not reflect those of my employer.
February 2009
M T W T F S S
 1
2345678
9101112131415
16171819202122
232425262728  
« Jan   Jul »
  • Who actually pays for credit card fraud? (part III)
  • Who actually pays for credit card fraud? (part II)
  • Sprints and marathons: why developer interviews miss the mark
  • Relics from the P2P file-sharing wars
  • Second-guessing Satoshi: ECDSA vs RSA? (part III)
  • Getting by without passwords: disk encryption
  • Future-proofing software updates: Global Platform and lessons from FBiOS (part III)
  • Getting by without passwords: LUKS with smart-cards (part II)
  • Bitcoin's meta problem: governance (part I)
  • Getting by without passwords: encrypted email

Month: February 2009

Strong authentication talk at Wharton

In January this blogger gave a talk at Wharton Business School, as part of the Information Security Best Practices conference.

Here is a note from ZDNet summarizing one audience member’s perspective. The presentation is online. More about the main points in a future post.

cemp

February 24, 2009Cem Paya 1 Comment
  • About
February 2009
M T W T F S S
 1
2345678
9101112131415
16171819202122
232425262728  
« Jan   Jul »

Popular

  • Who actually pays for credit card fraud? (part III)
  • Who actually pays for credit card fraud? (part II)
  • Getting by without passwords: encrypted email
  • Getting by without passwords: web-authentication (part I)
  • Sprints and marathons: why developer interviews miss the mark
1–2 minutes
Blog at WordPress.com.
  • Subscribe Subscribed
    • Random Oracle
    • Join 296 other subscribers
    • Already have a WordPress.com account? Log in now.
    • Random Oracle
    • Subscribe Subscribed
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar