acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

NPR on Biometric Data Collection
From Schneier on Security

NPR on Biometric Data Collection

Interesting Talk of the Nation segment.

Replacing Alice and Bob
From Schneier on Security

Replacing Alice and Bob

A proposal to replace cryptography's Alice and Bob with Sita and Rama: Any book on cryptography invariably involves the characters Alice and Bob. It is always...

Using Agent-Based Simulations to Evaluate Security Systems
From Schneier on Security

Using Agent-Based Simulations to Evaluate Security Systems

Kay Hamacher and Stefan Katzenbeisser, "Public Security: Simulations Need to Replace Conventional Wisdom," New Security Paradigms Workshop, 2011. Abstract: Is...

Quantum Cryptography
From Schneier on Security

Quantum Cryptography

Long article on quantum cryptography and cryptanalysis.

Homomorphic Encryption
From Schneier on Security

Homomorphic Encryption

Good summary article.

Security Vulnerability in Windows 8 Unified Extensible Firmware Interface (UEFI)
From Schneier on Security

Security Vulnerability in Windows 8 Unified Extensible Firmware Interface (UEFI)

This is the first one discovered, I think.

SHA-3 to Be Announced
From Schneier on Security

SHA-3 to Be Announced

NIST is about to announce the new hash algorithm that will become SHA-3. This is the result of a six-year competition, and my own Skein is one of the five remaining...

Friday Squid Blogging: Beached Firefly Squid
From Schneier on Security

Friday Squid Blogging: Beached Firefly Squid

Pretty photo of firefly squid beached along a coast. I've written about firefly squid before. As usual, you can also use this squid post to talk about the security...

Another Review of <i>Liars and Outliers</i>
From Schneier on Security

Another Review of Liars and Outliers

I usually don't post reviews of Liars and Outliers -- they're all here -- but I am particularly proud of this one.

Accountable Algorithms
From Schneier on Security

Accountable Algorithms

Ed Felten has two posts about accountable algorithms. Good stuff.

The NSA and the Risk of Off-the-Shelf Devices
From Schneier on Security

The NSA and the Risk of Off-the-Shelf Devices

Interesting article on how the NSA is approaching risk in the era of cool consumer devices. There's a discussion of the president's network-disabled iPad, and...

Analysis of PIN Data
From Schneier on Security

Analysis of PIN Data

An analysis of 3.4 million four-digit PINs. ("1234" is the most common: 10.7% of all PINs. The top 20 PINs are 26.8% of the total. "8068" is the least common...

Recent Developments in Password Cracking
From Schneier on Security

Recent Developments in Password Cracking

A recent Ars Technica article made the point that password crackers are getting better, and therefore passwords are getting weaker. It's not just computing speed...

Friday Squid Blogging: Octonaut
From Schneier on Security

Friday Squid Blogging: Octonaut

A space-traveling squid. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

Diamond Swallowing as a Ruse
From Schneier on Security

Diamond Swallowing as a Ruse

It's a known theft tactic to swallow what you're stealing. It works for food at the supermarket, and it also can work for diamonds. Here's a twist on that tactic...

Friday Squid Blogging: Giant Squid Museum
From Schneier on Security

Friday Squid Blogging: Giant Squid Museum

In Valdés, Spain. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

<i>Schneier on Security</i> on <i>Elementary</i>
From Schneier on Security

Schneier on Security on Elementary

Two of my books can be seen in the background in CBS' new Sherlock Holmes drama, Elementary. A copy of Schneier on Security is prominently displayed on Sherlock...

Man-in-the-Middle Bank Fraud Attack
From Schneier on Security

Man-in-the-Middle Bank Fraud Attack

This sort of attack will become more common as banks require two-factor authentication: Tatanga checks the user account details including the number of accounts...

UGNazi
From Schneier on Security

UGNazi

Good article on the hacker group UGNazi.

Estimating the Probability of Another 9/11
From Schneier on Security

Estimating the Probability of Another 9/11

This statistical research says once per decade: Abstract: Quantities with right-skewed distributions are ubiquitous in complex social systems, including political...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account