MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
IEEE Spectrum
April 2008
Saswato R. Das
Quantum Cryptography Cracked? Swedes find vulnerability in supposedly secure quantum cryptography system. mark for My Articles similar articles
Technology Research News
November 14, 2005
Quantum cryptography Quantum cryptography, which taps properties of photons to represent information, can, in theory, provide perfectly secure communications. mark for My Articles similar articles
IEEE Spectrum
April 2010
Mark Anderson
Torturing the Secret out of a Secure Chip A trick for subverting secure transactions and their power supply is publicized so the bad guys can't exploit it mark for My Articles similar articles
RootPrompt.org
May 15, 2000
Snake Oil Warning Signs If you ever have been asked by a PHB, or other type of manager to review a crypto package or find your self making decisions about what sorts of crypto (if any) to use then take a look at this FAQ.... mark for My Articles similar articles
RootPrompt.org
April 17, 2000
Lance Spitzner
Digital Certificates & Encryption Digital Certificates & Encryption - how they work and apply to Internet Commerce. mark for My Articles similar articles
IEEE Spectrum
November 2009
Sally Adee
Chip Design Thwarts Sneak Attack on Data Cache architecture harnesses the power of randomization to neutralize security attacks. mark for My Articles similar articles
Technology Research News
July 27, 2005
Eric Smalley
Quantum crypto scheme doubly fast Researchers have found a way to double the speed of information transfer over quantum cryptography systems. mark for My Articles similar articles
IEEE Spectrum
January 2009
Monica Heger
Cryptographers Take On Quantum Computers Researchers prepare for the day when quantum computers can easily crack today's codes. mark for My Articles similar articles
InternetNews
April 29, 2005
Michael Singer
Paul Kocher, President, Cryptography Research The man who designed SSL v3.0 talks about the latest security threats on the horizon and how cryptography can help solve them. mark for My Articles similar articles
InternetNews
April 9, 2008
David Needle
Cryptographers Debate Top Security Needs A panel agreed that it will take a coordinated effort to address America's security challenges and that technology alone isn't enough. mark for My Articles similar articles
Bank Technology News
March 2001
Maria Bruno
IDshield Promises Authentication With a Twist -- Hardware Help Those in the market for a new system to secure their Web operations face a dilemma--how to authenticate without intruding upon the customer's privacy. Kenneth Bob, chief executive officer of Uniondale, NY-based Safewww Inc., thinks it's a no-brainer... mark for My Articles similar articles
Science News
January 12, 2008
Julie J. Rehmeyer
Math Trek: Small Infinity, Big Infinity Infinity can be big or bigger, countable or not. mark for My Articles similar articles
IEEE Spectrum
May 2008
Sally Adee
The Hunt for the Kill Switch Are chip makers building electronic trapdoors in key military hardware? The Pentagon is making its biggest effort yet to find out mark for My Articles similar articles
IEEE Spectrum
January 2006
Justin Mullins
Chaotic Communication Researchers in Europe announced that they had used chaos to send digital messages at gigabit-per-second speeds over 115 kilometers of commercial optical fiber beneath the streets of Athens, Greece. mark for My Articles similar articles
InternetNews
June 25, 2009
Alex Goldman
IBM Claims Privacy Breakthrough for Cloud, Data Researcher Craig Gentry claims to have developed a new method for manipulating encrypted data - with major implications for data security, antispam efforts and cloud computing. mark for My Articles similar articles
The Motley Fool
October 17, 2007
Dan Bloom
Broadcom Leaps Ahead Broadcom's new chip promises to sharply reduce the cost of advance mobile phones. mark for My Articles similar articles
Bank Systems & Technology
June 26, 2009
Maria Bruno-Britz
IBM Develops Technique to Enable Confidential Processing of Encrypted Data Homomorphic encryption will allow for the analysis of private data by third parties without revealing the data's content. mark for My Articles similar articles
CIO
July 15, 2001
Fred Hapgood
Keeping Secrets Long ignored as an important security tool, encryption is finally getting its due... mark for My Articles similar articles
PC World
March 26, 2002
Martyn Williams
2.4-GHz Pentium 4 Makes a Surprise Appearance Intel hasn't even announced the new, speedier chip, but some PC makers were able to get their hands on them... mark for My Articles similar articles
The Motley Fool
September 19, 2006
Jack Uldrich
Intel's New Laser-Like Focus The company's latest silicon chip development could open up exciting new markets. The news offers investors yet another reason to believe Intel remains a sound long-term investment. mark for My Articles similar articles
The Motley Fool
August 30, 2004
Rich Duprey
Profiting From Moore's Law Intel develops a new chip that roughly doubles the number of transistors on a chip. Whether it's in the chip makers themselves, or in the picks and shovels of the industry, investors stand to make big profits from tiny chips. mark for My Articles similar articles
Salon.com
February 4, 2002
Barak Jolish
The encrypted jihad We can't stop terrorists from using uncrackable codes. So we shouldn't even try... mark for My Articles similar articles
BusinessWeek
January 9, 2006
Cliff Edwards
At Intel, "M" Means Modification The Pentium M chip is a redesign of the discarded Pentium III - and the competition is heating up. mark for My Articles similar articles
PC World
July 9, 2002
Lincoln Spector
Hard Drive Security Tool Ships PC Guardian updates Encryption Plus, on-the-fly file encryption program for networked PCs. mark for My Articles similar articles