Showing Results for
- Academic Journals (29)
Search Results
- 29
Academic Journals
- 29
- 1
- 2From:Communications of the ACM (Vol. 42, Issue 9) Peer-ReviewedFirewall technology is getting less effective against the myriad of computer viruses and worms that spread through the Internet and most particularly E-mail. What is referred to as malware ia able to tunnel through the...
- 3
- 4From:Nature (Vol. 413, Issue 6858) Peer-ReviewedAuthor(s): Bruce Schneier [1] [illus. 1] Appalled by the events of 11 September, many Americans have declared so loudly that they are willing to give up civil liberties in the name of security that this trade-off...
- 5
- 6From:Communications of the ACM (Vol. 44, Issue 4) Peer-ReviewedUnderwriters Laboratories (UL) is an independent testing organization created in 1893, when William Henry Merrill was called in to find out why the Palace of Electricity at the Columbian Exposition in Chicago kept...
- 7
- 8
- 9From:Communications of the ACM (Vol. 43, Issue 2) Peer-ReviewedOpen any popular article on public-key infrastructure (PKI) and you're likely to read that a PKI is desperately needed for e-commerce to flourish. Don't believe it. E-commerce is flourishing, PKI or no PKI. Web sites...
- 10From:Georgetown Law Journal (Vol. 106, Issue 4) Peer-ReviewedThe widespread use of encryption has triggered a new step in many criminal investigations: The encryption workaround. We define an encryption workaround as any lawful government effort to reveal unencrypted plaintext of...
- 11From:Journal of International Affairs (Vol. 71, Issue 2) Peer-ReviewedJournal of International Affairs: Cybersecurity is an increasing concern of governments all around the world. Are the risks real? Bruce Schneier: The risks are very real. Our critical infrastructure is increasingly...
- 12
- 13From:Communications of the ACM (Vol. 42, Issue 10) Peer-ReviewedThough cryptography is considered secure as long as the key length is large enough, cryptographic attacks are going beyond traditional cryptanalysis. The common thread in such attacks is the use of out-of-band...
- 14From:Nature (Vol. 452, Issue 7184) Peer-ReviewedAccess Denied edited by Ronald Deibert, John Palfrey, Rafal Rohozinski and Jonathan Zittrain MIT Press: 2008. 320 pp. $20.00, 12.95 [pounds sterling] In 1993, Internet pioneer John Gilmore said "the net...
- 15From:Communications of the ACM (Vol. 40, Issue 1) Peer-ReviewedCryptography has become the most widely used method for maintaining computer security. However, cryptography often fails to live up to its claims while even the strongest cryptography has it limits. Thus, the only way to...
- 16
- 17From:Communications of the ACM (Vol. 44, Issue 3) Peer-ReviewedIN the future, the computer security industry will be run by the insurance industry. I don t mean insurance companies will start selling firewalls, but rather the kind of firewall you use--along with the kind of...
- 18From:Communications of the ACM (Vol. 43, Issue 1) Peer-ReviewedHaving secure e-mail systems is an important security issue. One way if doing this is through public key encryption or corporate certificate authority (CA). There are some risks involved with this method such as not...
- 19
- 20