To benefit fully from today’s technology, we must complement it with a mandatory reporting system that is comprehensive, inexpensive, adequately protective of c... Read More »
Certain factors should be considered when companies choose a self-signed or public certificate authority to sign their certificates.
Read article... Read More »
Steven Bellovin explains that with a little work and help from the five biggest Internet companies, we can have secure email.
Read article... Read More »
For centuries, private international law, the branch of law concerning conflicts of law across international borders and jurisdictions, established rules based ... Read More »
Although biometric techniques offer robust authentication, they could violate privacy when used for public security. This survey explores Hong Kong residents' t... Read More »
This article describes and compares four approaches to storing payment keys and executing payment applications on mobile phones via near-field communication at ... Read More »
In Victoria, Australia, the vVote verifiable voting system allowed blind voters and voters in remote locations to cast fully secret ballots in a verifiable way.... Read More »
By recognizing the value of risk management as a communication tool, security practitioners can tap opportunities to improve the security dialogue with staff.
... Read More »
A cybersecurity economics model is presented for public policy regarding electricity transmission infrastructure combining the US style (a mostly rules-based mo... Read More »
Because Web 2.0 applications often result in novel exploits, data leaks, or identity theft, the solution is to understand the attacks and assess how best to pre... Read More »