Similar Articles |
|
IEEE Spectrum April 2010 Mark Anderson |
Torturing the Secret out of a Secure Chip A trick for subverting secure transactions and their power supply is publicized so the bad guys can't exploit it |
InternetNews May 6, 2005 Erin Joyce |
Bob Weinschenk, CEO, Britestream And here's the pitch: The time has come for offloading online security from the software side to the hardware side of the network. |
Bank Technology News July 2008 Rebecca Sausner |
Could the U.S. Be the Next Estonia? Gadi Evron, former Israeli Government Internet Security Operations Manager, went to Estonia during the crippling DDOS attacks last May. Here he talks about whether the U.S. is vulnerable to such an attack, and the role banks and home computers play in protecting critical infrastructure. |
IEEE Spectrum December 2012 Tam Harbert |
New King of Security Algorithms Crowned A five-year hunt for a new cryptographic hash scheme leads to the discovery that the old one was really good |
Science News December 8, 2007 Julie J. Rehmeyer |
Math Trek: Mathematical Police Find Security Bug Cryptographers uncover potential weakness in encryption algorithms. |
InternetNews May 26, 2006 Tim Scannell |
Jamie de Guerre, Director, Partner Programs, Cloudmark Spam isn't going anywhere, and Jamie de Guerre's company is tracking its trails through our inboxes. |
InternetNews January 12, 2011 |
Hacker to Expose Wi-Fi Flaw Using Amazon EC2 At next week's Black Hat conference, a security expert reportedly plans to divulge method for breaking wireless networking passwords through brute force attack. |
Linux Journal April 1, 2007 Girish Venkatachalam |
The OpenSSH Protocol under the Hood The nitty-gritty details as to what OpenSSH is and why it is ubiquitous. |
InternetNews December 31, 2008 Richard Adhikari |
Mozilla, Microsoft Move to Nix Web Security Flaw Industry rushes to address vulnerability found at the heart of some digital certificate services. |
IEEE Spectrum November 2008 |
Q&A With Post-Quantum Computing Cryptography Researcher Jintai Ding Quantum computers may be the perennial "computer of the future," but if (or when) they do become a reality, their sheer power could threaten the security of our information-technology infrastructure. |
InternetNews July 16, 2004 Michael Singer |
Philip Zimmermann, PGP Creator The e-mail encryption software writer talks about ways technologists can protect privacy and still make money. |
Search Engine Watch January 20, 2010 Jason King |
Google's New Approach to China: A Closer Look at the Attack Heard 'Round the Web Taking a look at the numerous security implications for Google users after last week's cyber attack on Google by China. |
JavaWorld December 2002 Michael Juntao Yuan |
Data security in mobile Java applications Learn how to select and use third-party security toolkits |
JavaWorld October 2000 Raghavan N. Srinivas |
AES: Who won? The Advanced Encryption Standard (AES) aims to replace the aging Data Encryption Standard (DES). In this article, Raghavan Srinivas relates the cryptographic community's views -- especially the views of those directly involved with the process -- on the selection process and the future of AES... |
InternetNews July 8, 2009 Alex Goldman |
U.S., South Korea Under Cyber Attack Governments and security firms are working together to fight an attack which, though massive, contains very primitive components. |
RootPrompt.org May 15, 2000 |
Snake Oil Warning Signs If you ever have been asked by a PHB, or other type of manager to review a crypto package or find your self making decisions about what sorts of crypto (if any) to use then take a look at this FAQ.... |
InternetNews March 18, 2005 Erin Joyce |
Bruce Schneier, CTO, Counterpane Internet Security An interview covering the weakness of 2-factor authentication on the Internet, managed security services, software insecurity, and advice for lawmakers. |
D-Lib Nov/Dec 2014 Fedoryszak & Bolikowski |
Efficient Blocking Method for a Large Scale Citation Matching In this paper, we will focus on citation matching task, i.e. creating links between a bibliography entry and the referenced publication record in a database. |
IEEE Spectrum January 2009 Monica Heger |
Cryptographers Take On Quantum Computers Researchers prepare for the day when quantum computers can easily crack today's codes. |
Technology Research News July 14, 2004 Kimberly Patch |
Probabilities ease genetic logic Genetic algorithms are turning out to be useful for optimizing designs and solving problems. Researchers have devised a compact genetic algorithm that speeds the process by allowing a representation of the population as a whole to be passed back and forth rather than more voluminous information about individuals. |
The Motley Fool June 13, 2011 Arunava De |
Are Hackers the Next Threat to Your Portfolio? Before you respond to a malicious attack on one of your investments in your portfolios, measure the impact that such an attack can have on the company. |