acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Identifying Tor Users Through Insecure Applications
From Schneier on Security

Identifying Tor Users Through Insecure Applications

Interesting research: "One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users": Abstract: Tor is a popular low-latency anonymity...

The Futility of Defending the Targets
From Schneier on Security

The Futility of Defending the Targets

This is just silly: Beaver Stadium is a terrorist target. It is most likely the No. 1 target in the region. As such, it deserves security measures commensurate...

Detecting Forged Signatures Using Pen Pressure and Angle
From Schneier on Security

Detecting Forged Signatures Using Pen Pressure and Angle

Interesting: Songhua Xu presented an interesting idea for measuring pen angle and pressure to present beautiful flower-like visual versions of a handwritten signature...

FOWA Dublin 2009 Recap
From Springenwerk Blog

FOWA Dublin 2009 Recap

I think there are 2 letters to sum up this event: OK. Content-wise, it was between OK and great. The organization of the event was terrible, though: The venue was...

House Homeland Security Committee Looks to 2009
From U.S. Public Policy Committee of the ACM

House Homeland Security Committee Looks to 2009

The majority staff of the House Homeland Security Committee hosted a workshop December 3 on "Constitutional Protections in Homeland Security." A copy of the agenda...

USACM Chair Spafford Addresses Information Security Curricula
From U.S. Public Policy Committee of the ACM

USACM Chair Spafford Addresses Information Security Curricula

USACM Chair Eugene Spafford recently made predictions about information security curriculua in American higher education for CSO Magazine. You can read his comments...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account