201 Hits in 4.4 sec

Commital Deniable Proofs and Electronic Campaign Finance [chapter]

Matt Franklin, Tomas Sander
2000 Lecture Notes in Computer Science  
To realize their proposal, we propose new cryptographic protocols for commital deniable proofs and deniable payment schemes.  ...  In a recent Stanford Law Review article, Ayres and Bulow [1] propose a radical anonymity-based solution to disrupt the "market" for monetary influence in political campaigns.  ...  To achieve this we introduce the notion of commital deniable proofs and show that every statement can be proved in a commital deniable way.  ... 
doi:10.1007/3-540-44448-3_28 fatcat:3y2pffzer5g5jgxipd5pttmefy

National Security and International Policy Challenges in a Post Stuxnet World

Vytautas Butrimas
2014 Lithuanian Annual Strategic Review  
The international community must act in order to insure that the use of this new weapon by States will not get out of hand and be the cause of new and more serious international conflicts.  ...  The international community has focused too much on addressing cybercrime and cyber hacktivist questions.  ...  of the Stuxnet family and its suspected surveillance of domestic and foreign electronic communications.  ... 
doi:10.2478/lasr-2014-0001 fatcat:vd4uqlgmqrcxbetwoupzmvapzm

Mobilising Cyber Power

Alexander Klimburg
2011 Survival (London. 1959)  
Cyber crime, cyber terrorism and cyber warfare share a common technological basis, tools, logistics and operational methods. They can also share the same social networks and have comparable goals.  ...  From the perspective of a cyber warrior, cyber crime can offer the technical basis (software tools and logistic support) and cyber terrorism the social basis (personal networks and motivation) with which  ...  One of the earliest cyber campaigns, known as Moonlight Maze, occurred in 1998-2000.  ... 
doi:10.1080/00396338.2011.555595 fatcat:vcqcqagetzembnw4jeshnoojse

'Bullets of Truth': Julian Assange and the Politics of Transparency

Mark Fenster
2019 Social Science Research Network  
parties plausible deniability about their work and collaboration.  ...  posted them, and would hurt Clinton's campaign while assisting Trump's.  ... 
doi:10.2139/ssrn.3323950 fatcat:um35m66k65dbriwxv656covcgq

Concealing Conflict Markets: How Rebels and Firms Use State Institutions to Launder Wartime Trade

Rachel Sweet
2021 International Organization  
The framework and evidence contribute theoretical and policy understandings for rebel governance, state building and fragmentation, and illicit global markets.  ...  I develop a framework for how this strategy works that traces how international sovereignty norms and sanctions regimes create incentives for rebels, firms, and bureaucrats to coordinate around this legal  ...  and David Szakonyi.  ... 
doi:10.1017/s0020818321000205 fatcat:kcairkiitrggzbtfulovlrbirm

The New Fighting Words?: How U.S. Law Hampers the Fight Against Information Warfare

Jill I. Goldenziel, Manal Cheema
2018 Social Science Research Network  
This Article argues that the United States must reform laws and doctrine concerning speech, information, and privacy to protect the democratic process and national security.  ...  The Article concludes with recommendations on how courts, legislatures, and policymakers should balance First Amendment and privacy rights with national security interests to combat information warfare  ...  influence campaigns are "multifaceted and designed to be deniable because they use a mix of agents of influence, cutouts, front organizations, and false-flag operations." 31 The influence campaign leading  ... 
doi:10.2139/ssrn.3286847 fatcat:ugq7xntprnhxjedn6cdvyok2ha

A Comparative Approach to Economic Espionage: Is Any Nation Effectively Dealing with this Global Threat?

Melanie Reid
2016 Social Science Research Network  
This article explores the reasons behind the U.S. government's two-pronged approach: preventing the thefts by educating and training private companies to improve security and safeguard their secrets, and  ...  This article also examines how various countries are handling the economic espionage threat and how differences in cultural, historical, and nationalistic backgrounds as well as economic and political  ...  The PLA has placed computer network operations in a unified framework broadly known as information confrontation and seeks to integrate all elements of information warfare, electronic and non-electronic  ... 
doi:10.2139/ssrn.2934488 fatcat:x432xx5mlrh2hl432ovkarf7i4

Scaling Distributed Ledgers and Privacy-Preserving Applications [article]

Alberto Sonnino
2021 arXiv   pre-print
This settlement system is based on Byzantine Consistent Broadcast as its core primitive, foregoing the expenses of full atomic commit channels (consensus).  ...  This thesis proposes techniques aiming to make blockchain technologies and smart contract platforms practical by improving their scalability, latency, and privacy.  ...  The Byzcuit Atomic Commit Protocol 107 and pre-abort(T, sT ). Proof.  ... 
arXiv:2102.12273v1 fatcat:3twoaysg7rcj7h4yogwsyyzd34

Page 2625 of Mathematical Reviews Vol. , Issue Subject Index [page]

Mathematical Reviews  
V., 2002¢:00009 Franklin, Matthew (with Sander, Tomas) Commital deniable proofs and electronic campaign finance.  ...  English and Russian summaries) 2002i:91057 Perroni, Carlo (with Scharf, Kimberley A.) Tiebout with politics: capital tax competition and constitutional choices.  ... 

Page 584 of Mathematical Reviews Vol. , Issue Author Index [page]

Mathematical Reviews  
Acoust. 9 (2001), no. 3, 1095-1109. 65N06 Franklin, Matthew (with Sander, Tomas) Commital deniable proofs and electronic campaign finance.  ...  (English summary) Electron. J. Differential Equations 2002, No. 15, 27 pp. (electronic). (Toyohiko Aiki) 2002m:35230 35R35 (35B41, 37L30, 74N20, 80A22) Frankel, N. E. (with Garoni, T. M.; Glasser, M.  ... 

Secret Bedfellows? The KGB, Carlos the Jackal and Cold War Psychological Warfare

Adrian Hänni
2018 Studies in Conflict and Terrorism  
The seal of Karolus Magnus or Charlemagne -the AESP logo ROGUE AGENTS 4 Fourth and final edition, December 2015  ...  Besides the infiltration of political campaigns, undercover police officers also sought to spy on and discredit those contesting the result of police inquiries, notably the support group for the family  ...  He is a member of the Knights of Malta, a conservative lay Catholic group and has been involved with Americares, a right-wing private organization that receives grants from the U.S.  ... 
doi:10.1080/1057610x.2018.1471970 fatcat:h33jofo2jvelpaiox2fmuo6ooe

Contemplating a Cyber Weapons Convention: An Exploration of Good Practice and Necessary Preconditions

Kalpokienė Julija, Kalpokas Ignas
2020 Baltic Journal of Law & Politics  
This article takes up one such dangerously underregulated area: cyber warfare and regulation of cyber weapons.  ...  Despite being a crucially important domain for states, businesses, and individuals, cyberspace still suffers from a regulation deficit.  ...  to meet the destruction deadlines is a clear proof of that.  ... 
doi:10.2478/bjlp-2020-0003 doaj:86b5e2e7037f470b83e73412cac6a0c9 fatcat:6izxpqpdpvhirb3s6h6nrq73ja

Page 1733 of Mathematical Reviews Vol. , Issue Author Index [page]

Mathematical Reviews  
(Valérie Berthé) 2002j:68080 68R15 (37B10) Sander, Tomas (with Franklin, Matthew) Commital deniable proofs and electronic campaign finance. (English summary) Advances in cryptology—ASIACRYPT 2000  ...  Soc. 130 (2002), no. 1, 69-72 (electronic). (Frank Loray) 2002):32031 32865 (14B05) Sancho de Salas, J. B. (with Faro Rivas, R.; Navarro Gonzalez, J. A.)  ... 

The Creation and Protection of History through the Prism of International Criminal Justice in Al Mahdi

Shea Elizabeth Esterling, Michael John-Hopkins
2018 Journal of International Humanitarian Legal Studies  
its primary goals of retribution and deterrence.  ...  the ad hoc tribunals for the Former Yugoslavia and Rwanda, which have been criticised as being too expensive and too expansive in responding to atrocity crimes.  ...  standards of proof.  ... 
doi:10.1163/18781527-00901001 fatcat:7iifenkihrczfk3fpf4isohv4m

Anti-social networking: crowdsourcing and the cyber defence of national critical infrastructures

Chris W. Johnson
2013 Ergonomics  
The ubiquitous and distributed nature of these architectures makes it increasingly difficult to determine who owns and operates these systems.  ...  The last decade has seen a growing number of cyber-attacks, for instance on Estonia, Belarus, Lithuania, Georgia, Pakistan and India.  ...  of attribution and allowing for plausible deniability.  ... 
doi:10.1080/00140139.2013.812749 pmid:23826703 fatcat:gqobtlj3y5hcxgtxni4q6z75f4
« Previous Showing results 1 — 15 out of 201 results