acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
dateMore Than a Year Ago
subjectSecurity
authorMIT News
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


­sing Bitcoin to Prevent Identify Theft
From ACM TechNews

­sing Bitcoin to Prevent Identify Theft

A new system uses bitcoin's security mechanisms to foil online identify thieves.

Protecting Web ­sers' Privacy
From ACM TechNews

Protecting Web ­sers' Privacy

Splinter is a new encryption system that disguises users' database queries so they reveal no private information.

How to Stay Anonymous Online
From ACM TechNews

How to Stay Anonymous Online

New technology for protecting anonymity online provides stronger security guarantees but uses bandwidth much more efficiently than previous anonymity networks.

How to Stay Anonymous Online
From ACM News

How to Stay Anonymous Online

Anonymity networks protect people living under repressive regimes from surveillance of their Internet use. But the recent discovery of vulnerabilities in the most...

We Know Where You Live
From ACM TechNews

We Know Where You Live

Researchers have demonstrated that snoopers armed with little sophisticated technology can expose the home and workplace addresses of Twitter users. 

Robotic Consensus
From ACM News

Robotic Consensus

Planning algorithms for teams of robots fall into two categories: centralized algorithms, in which a single computer makes decisions for the whole team, and decentralized...

Hack-Proof Rfid Chips
From ACM TechNews

Hack-Proof Rfid Chips

Researchers at the Massachusetts Institute of Technology and Texas Instruments have developed a virtually hack-proof radio-frequency identification chip.

Untraceable Communication Guaranteed
From ACM TechNews

Untraceable Communication Guaranteed

Massachusetts Institute of Technology researchers have unveiled an untraceable text-messaging system designed to foil even the most powerful adversaries.

Untraceable Communication—guaranteed
From ACM News

Untraceable Communication—guaranteed

Anonymity networks, which sit on top of the public Internet, are designed to conceal people’s Web-browsing habits from prying eyes.

What Are Your Apps Hiding?
From ACM TechNews

What Are Your Apps Hiding?

Researchers have found the user experience is largely unaffected by much of the data transferred between the top 500 free Google Android cellphone applications. ...

A Basis For All Cryptography
From ACM TechNews

A Basis For All Cryptography

The inability to practically apply indistinguishability obfuscation to deliver secure cryptography may be mitigated with an efficient method for functional encryption...

Crash-Tolerant Data Storage
From ACM TechNews

Crash-Tolerant Data Storage

Massachusetts Institute of Technology researchers have developed what they call the first computer file system that ensures no loss of data when the system crashes...

Shoring ­p Tor
From ACM TechNews

Shoring ­p Tor

Researchers have demonstrated a vulnerability in Tor's design. 

Automatic Bug Repair
From ACM News

Automatic Bug Repair

At the Association for Computing Machinery's Programming Language Design and Implementation conference this month, MIT researchers presented a new system that repairs...

Advance in Quantum Error Correction
From ACM TechNews

Advance in Quantum Error Correction

Researchers have developed a quantum error correction code that requires the measurement of only a few quantum bits at a time. 

"fingerprinting" Chips to Fight Counterfeiting
From ACM TechNews

"fingerprinting" Chips to Fight Counterfeiting

Researchers are using microscopic variations to "fingerprint" silicon chips used in consumer-product tags to combat product counterfeiting. 

Cloud Security Reaches Silicon
From ACM TechNews

Cloud Security Reaches Silicon

Researchers are working to implement a way to thwart criminals from inferring computer data based on the pattern in which the machine accesses its memory.

Better Debugger
From ACM TechNews

Better Debugger

Researchers last week unveiled a new algorithm for identifying integer-overflow bugs. 

Radio Chip For the "internet of Things"
From ACM TechNews

Radio Chip For the "internet of Things"

A new wireless transmitter design reduces off-state leakage 100-fold while providing adequate power for Bluetooth or 802.15.4 transmissions.

Who's Using Your Data?
From ACM TechNews

Who's Using Your Data?

The HTTP with Accountability protocol is designed to track the transmission of private data and enable the data owner to see how it is used online. 
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account