Balancing statistical accuracy and subject privacy in large social-science datasets.Olivia Angiuli, Joe Blitzstein, Jim Waldo From Communications of the ACM | December 2015
How can the expected interactions between caller and implementation be guaranteed?
Robert F. Sproull, Jim Waldo From Communications of the ACM | March 2014
An RFID-passport attack is more plausible than skimming RFID information. Do RFID passports make us vulnerable to identity theft?
Alan Ramos, Weina Scott, William Scott, Doug Lloyd, Katherine O'Leary, Jim Waldo From Communications of the ACM | December 2009