George Washington University computer science professor, Poorvi Vora, once said, “Brush your teeth. Eat your spinach. Audit your elections.”
This is the prevai... Read More »
While the controversy still simmers about Russia’s hacking into the recent US presidential election, it was actually the controversial Bush/Gore election of 200... Read More »
Gone are the days of punching holes in a ballot and dropping it into a box on election day. Internet voting is here.
But instead of a few minutes behind a curt... Read More »
Extensive simulations for 11 cities and real experiments for two cities show that a significant number of users are vulnerable to tracking by seemingly innocuou... Read More »
Gone are the days of simple smart-home tech—alarms, controlled lights, and garage door openers. Today, for example, smart homes are capable of saving you money ... Read More »
A proof-of-concept device can provide auto insurers with the aggregate statistics they seek without affecting driver privacy by transmitting data points collect... Read More »
In 2015, the NSA released a statement on the need for postquantum cryptography, which will be a great stimulus to the development, standardization, and commerci... Read More »
IEEE Security & Privacy met with several interesting speakers during Security & Privacy Week. This interview features Srđan Čapkun, computer science pro... Read More »
In December 2016, the US Commission on Enhancing National Cybersecurity released a report in response to challenges posed by cyberthreats. This opinion piece de... Read More »
Internet censors use networking tools like deep-packet inspection (DPI) to identify information they deem objectionable. In response, network traffic obfuscatio... Read More »