Quantcast
Channel: cryptography – Learning Tree Blog
Browsing all 5 articles
Browse latest View live

Are Consumer Crypto Systems Too Hard To Use?

In a previous post,  I summarized some academic papers in which prominent cryptographers and other security experts took a very skeptical look at current cryptography, both research and practical...

View Article



Cyber Security Requires Cautious Logic

If we don’t carefully distinguish between necessary and sufficient when we are analyzing information assurance systems, we may become dangerously confident in a system that is actually quite weak. This...

View Article

How Will Vehicle-To-Everything (V2X) Communication Transform Your Car?

A casual mention of Vehicle to Everything, or V2X,  in a mailing list, led me to a short article, and that led to much more. It made me aware of a project that may make huge changes to how we get...

View Article

How I Was Wrong About Kerberos

Microsoft’s Active Directory includes a version of Kerberos that has had a bad reputation. There were problems several years ago, but the criticisms are now outdated. What was the problem, and how has...

View Article

How To Enter The Cyber Security Field

During Cyber Security Awareness Month we hear about how important being #CyberAware is. “Do your part! Be careful!” It’s important to take this seriously. But additionally, this field offers job...

View Article

Browsing all 5 articles
Browse latest View live




Latest Images