Archive for the 'security' Category

Jul 01 2008

Object based Captchas

Published by under internet,security

If traditional captchas are becoming more easy to crack with OCR software, I wonder if anyone has thought of doing a captcha where you identify the object in the image?  It seems that it would be significantly harder than recognizing text for an automated system.  If anything, it would at least spur research into object […]

No responses yet

Aug 23 2007

Venetian Election Protocol

Published by under elections,security

Bruce Schneier has pointed out an interesting analysis of the protocol used to elect the Doge of Venice from 1268 until the 18th century (pdf). It is quite complicated, involving 10 rounds of expanding the college by election and shrinking it by lot. The paper was prompted by research into computer networks that must elect […]

No responses yet