MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
IEEE Spectrum
April 2010
Mark Anderson
Torturing the Secret out of a Secure Chip A trick for subverting secure transactions and their power supply is publicized so the bad guys can't exploit it mark for My Articles similar articles
InternetNews
May 6, 2005
Erin Joyce
Bob Weinschenk, CEO, Britestream And here's the pitch: The time has come for offloading online security from the software side to the hardware side of the network. mark for My Articles similar articles
Bank Technology News
July 2008
Rebecca Sausner
Could the U.S. Be the Next Estonia? Gadi Evron, former Israeli Government Internet Security Operations Manager, went to Estonia during the crippling DDOS attacks last May. Here he talks about whether the U.S. is vulnerable to such an attack, and the role banks and home computers play in protecting critical infrastructure. mark for My Articles similar articles
IEEE Spectrum
December 2012
Tam Harbert
New King of Security Algorithms Crowned A five-year hunt for a new cryptographic hash scheme leads to the discovery that the old one was really good mark for My Articles similar articles
Science News
December 8, 2007
Julie J. Rehmeyer
Math Trek: Mathematical Police Find Security Bug Cryptographers uncover potential weakness in encryption algorithms. mark for My Articles similar articles
InternetNews
May 26, 2006
Tim Scannell
Jamie de Guerre, Director, Partner Programs, Cloudmark Spam isn't going anywhere, and Jamie de Guerre's company is tracking its trails through our inboxes. mark for My Articles similar articles
InternetNews
January 12, 2011
Hacker to Expose Wi-Fi Flaw Using Amazon EC2 At next week's Black Hat conference, a security expert reportedly plans to divulge method for breaking wireless networking passwords through brute force attack. mark for My Articles similar articles
Linux Journal
April 1, 2007
Girish Venkatachalam
The OpenSSH Protocol under the Hood The nitty-gritty details as to what OpenSSH is and why it is ubiquitous. mark for My Articles similar articles
InternetNews
December 31, 2008
Richard Adhikari
Mozilla, Microsoft Move to Nix Web Security Flaw Industry rushes to address vulnerability found at the heart of some digital certificate services. mark for My Articles similar articles
IEEE Spectrum
November 2008
Q&A With Post-Quantum Computing Cryptography Researcher Jintai Ding Quantum computers may be the perennial "computer of the future," but if (or when) they do become a reality, their sheer power could threaten the security of our information-technology infrastructure. mark for My Articles similar articles
InternetNews
July 16, 2004
Michael Singer
Philip Zimmermann, PGP Creator The e-mail encryption software writer talks about ways technologists can protect privacy and still make money. mark for My Articles similar articles
Search Engine Watch
January 20, 2010
Jason King
Google's New Approach to China: A Closer Look at the Attack Heard 'Round the Web Taking a look at the numerous security implications for Google users after last week's cyber attack on Google by China. mark for My Articles similar articles
JavaWorld
December 2002
Michael Juntao Yuan
Data security in mobile Java applications Learn how to select and use third-party security toolkits mark for My Articles similar articles
JavaWorld
October 2000
Raghavan N. Srinivas
AES: Who won? The Advanced Encryption Standard (AES) aims to replace the aging Data Encryption Standard (DES). In this article, Raghavan Srinivas relates the cryptographic community's views -- especially the views of those directly involved with the process -- on the selection process and the future of AES... mark for My Articles similar articles
InternetNews
July 8, 2009
Alex Goldman
U.S., South Korea Under Cyber Attack Governments and security firms are working together to fight an attack which, though massive, contains very primitive components. mark for My Articles similar articles
RootPrompt.org
May 15, 2000
Snake Oil Warning Signs If you ever have been asked by a PHB, or other type of manager to review a crypto package or find your self making decisions about what sorts of crypto (if any) to use then take a look at this FAQ.... mark for My Articles similar articles
InternetNews
March 18, 2005
Erin Joyce
Bruce Schneier, CTO, Counterpane Internet Security An interview covering the weakness of 2-factor authentication on the Internet, managed security services, software insecurity, and advice for lawmakers. mark for My Articles similar articles
D-Lib
Nov/Dec 2014
Fedoryszak & Bolikowski
Efficient Blocking Method for a Large Scale Citation Matching In this paper, we will focus on citation matching task, i.e. creating links between a bibliography entry and the referenced publication record in a database. mark for My Articles similar articles
IEEE Spectrum
January 2009
Monica Heger
Cryptographers Take On Quantum Computers Researchers prepare for the day when quantum computers can easily crack today's codes. mark for My Articles similar articles
Technology Research News
July 14, 2004
Kimberly Patch
Probabilities ease genetic logic Genetic algorithms are turning out to be useful for optimizing designs and solving problems. Researchers have devised a compact genetic algorithm that speeds the process by allowing a representation of the population as a whole to be passed back and forth rather than more voluminous information about individuals. mark for My Articles similar articles
The Motley Fool
June 13, 2011
Arunava De
Are Hackers the Next Threat to Your Portfolio? Before you respond to a malicious attack on one of your investments in your portfolios, measure the impact that such an attack can have on the company. mark for My Articles similar articles