Skip to main content

Questions tagged [distributed-computing]

2 votes
1 answer
251 views

I need some serious suggestions on my protocol, specifically for decryption. So the scenario is Organizations A and B encrypt their employees' records with their respective public keys and store them ...
Laila Tul Badar's user avatar
1 vote
2 answers
386 views

Assume in a distributed network, where the nodes are not trusted and are identified by their public keys, we intend to select one of them in a random process. In such a situation, all of the nodes ...
Questioner's user avatar
  • 1,347
0 votes
2 answers
199 views

Let's assume we have an internal environment consisting of some distributed systems, one central system and an internal PKI. The central system is serving a cluster of HSMs that shall be accessable by ...
moritz1895's user avatar
0 votes
1 answer
291 views

I've been thinking about this problem for some time and I wanted to ask if there are any known methods, or research papers, about how to prove "authenticity" or correctness of data ...
Todd Fulton's user avatar
3 votes
1 answer
288 views

At least some decentralised networks purported to provide anonymity are vulnerable to this attack: the original software is modified to allow tracking/logging/whatever, and a large amount of nodes ...
Greendrake's user avatar
1 vote
1 answer
466 views

Pentesting the new webapp that we have developed before having an external source have a go at it and give us a risk assessment. Now we have come to the portion right at the end; DDOS. For the most ...
Nilo's user avatar
  • 13
1 vote
0 answers
675 views

I originally attempted to use Maltego before making any configuration changes to my firewall; however, I was being blocked because I had port 135 disabled which is what Windows uses for RPC. After ...
Mdot's user avatar
  • 17
1 vote
0 answers
129 views

I'm attempting to build a mechanism to prevent frauds and provide traceability of physical resources in a distributed system. The idea is straightforward: the resource travels hop-by-hop on a network ...
Gabriel Rebello's user avatar
2 votes
0 answers
191 views

Suppose the NSA through legal means, or a malware group through illegal means has access to enormous computational resources via a backdoor into all Microsoft Windows machines (or some significant ...
coder's user avatar
  • 141
0 votes
1 answer
200 views

I am having a lot of failed ssh authentication requests for the past two days, from various service providers. It seems somebody is intent on breaking into my computer. I am using Ubuntu on a Dell ...
Pratyush Rathore's user avatar
-1 votes
2 answers
206 views

In card games like poker it is critical that players do not know the hands of the other players until they simultaneously show their cards to see who has won. Is there a cryptographic technique to ...
bmiller59's user avatar
3 votes
2 answers
528 views

The Ethereum website says that it provides a "cryptographically secure, decentralized, tamper-proof network" on which applications written in the Solidity contract language could be deployed. (https://...
bmiller59's user avatar
6 votes
1 answer
355 views

I just came across the Milagro project which seems to be solving some of the limitations introduced by PKI (centralized trust authorities with single point of failure hard-to-revoke root keys, using X....
Jedi's user avatar
  • 4,036
18 votes
3 answers
18k views

Jami calls itself "ultimate privacy and control for your voice, video and chat communications". But forums online mentioned in passing (little depth) that it uses bad cryptography protocols ...
Wolf's user avatar
  • 289
11 votes
2 answers
980 views

Electronic voting has been considered technical infeasible for a long time. And recently I watched a video from the channel Computerphile on YouTube where they bring up all the problems that come ...
flxh's user avatar
  • 229

15 30 50 per page