acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

XRDS: Crossroads, The ACM Magazine for Students
From XRDS

XRDS: Crossroads, The ACM Magazine for Students


Stay weird, stay different
From XRDS

Stay weird, stay different

Sean Follmer

Inbox
From XRDS

Inbox

XRDS Staff

Alice and Bob in the new world
From XRDS

Alice and Bob in the new world

Shashank Agrawal

ACM-W chapters at home and abroad: An initiative on women, not of women
From XRDS

ACM-W chapters at home and abroad: An initiative on women, not of women

Claudia Schulz

Chronicling ciphers
From XRDS

Chronicling ciphers

Jay Patel

The Ph.D. journey: tips from somebody who managed to defend his thesis
From XRDS

The Ph.D. journey: tips from somebody who managed to defend his thesis

Vaggelis Giannikas

Computer science faculty careers at liberal arts colleges
From XRDS

Computer science faculty careers at liberal arts colleges

Janet Davis, Jeannie Albrecht, Christine Alvarado, Tzu-Yi Chen, Amy Csizmar Dalal, Sohie Lee

Exception handling evaluation of large APIs
From XRDS

Exception handling evaluation of large APIs

Maria Kechagia

On the evolution of security bugs
From XRDS

On the evolution of security bugs

Dimitris Mitropoulos

Kristin Lauter on cryptography and mathematics
From XRDS

Kristin Lauter on cryptography and mathematics

Shashank Agrawal, Billy RathjeThere are unique challenges posed by cryptography research. This interview examines potential threats to modern security techniques...

Fully homomorphic encryption: cryptography's holy grail
From XRDS

Fully homomorphic encryption: cryptography's holy grail

David J. WuFor more than 30 years, cryptographers have embarked on a quest to construct an encryption scheme that would enable arbitrary computation on encrypted...

Encrypted search
From XRDS

Encrypted search

Seny KamaraThe need to embed search functionality into every aspect of technology has produced an abundance of information that is difficult to secure. Can advances...

Secure your data and compute on it, too
From XRDS

Secure your data and compute on it, too

Mike RosulekModern cryptography provides techniques to perform useful computations on sensitive data.

Exploring the risks to identity security and privacy in cyberspace
From XRDS

Exploring the risks to identity security and privacy in cyberspace

Jason R. C. NurseCyberspace, a world of great promise, but also, of great peril. Pirates, predators, and hackers galore, are you and your online identity at risk...

The Wrens of Bletchley Park
From XRDS

The Wrens of Bletchley Park

Michael SmithThe lives and times of the British women who operated Colossus, and their all-important role in events leading to D-Day and the close of the Second...

Profile Ian Pratt: pioneering security through virtualization
From XRDS

Profile Ian Pratt: pioneering security through virtualization

Adrian Scoică

Cyber security centre: University of Oxford, United Kingdom
From XRDS

Cyber security centre: University of Oxford, United Kingdom

Luke Garratt

Ancient and modern cryptography
From XRDS

Ancient and modern cryptography

Finn Kuusisto

Counting stars: pattern counting in networks
From XRDS

Counting stars: pattern counting in networks

Tomaz Hočevar
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account