![How to fix email: making communication encrypted and decentralized with autocrypt](/images/DLImages/S18_F6_s.png)
SECTION: Features
Email has been declared dead many times but refuses to die. There is a new effort underway to make encrypted end-to-end email communication as automatic as possible. It is part of a diverse set of efforts to reinvigorate the email ecosystem, which remains a crucial cornerstone of a functioning, open internet.
By Holger Krekel, Karissa McKelvey, Emil Lefherz, July 2018
PDF | HTML | In the Digital Library
![Toward computing over encrypted data in IoT systems](/images/DLImages/Shafagh_thumb.jpg)
FEATURE: Features
The multitude of IoT devices contributes to the enormous amount of data stored on corporate clouds. Yet the level of computing power has outpaced advances in privacy protection. Could encrypted search preserve the privacy of data, while utilizing the computing power of the cloud?
By Hossein Shafagh, December 2015
PDF | HTML | In the Digital Library
![Kristin Lauter on Cryptography and Mathematics](/images/DLImages/XR213_F1_thumb.jpg)
SECTION: Features
There are unique challenges posed by cryptography research. This interview examines potential threats to modern security techniques and how to overcome them.
By Shashank Agrawal, Billy Rathje, March 2015
PDF | HTML | In the Digital Library
![Encrypted Search](/images/DLImages/XR213_F3_kamara_thumb.jpg)
The need to embed search functionality into every aspect of technology has produced an abundance of information that is difficult to secure. Can advances in cryptography resolve the inherent conflicts of big data?
By Seny Kamara, March 2015
PDF | HTML | In the Digital Library
![Secure Your Data and Compute on It, Too](/images/DLImages/XR213_F4Rouslek_thumb.jpg)
Modern cryptography provides techniques to perform useful computations on sensitive data.
By Mike Rosulek, March 2015
PDF | HTML | In the Digital Library
![Something Bad Might Happen: Lawyers, anonymization and risk](/images/DLImages/20.1 F2 Oswald thumb.png)
SECTION: Features
The line between personal and anonymous information is often unclear. Increasingly it falls to lawyers to understand and manage the risks associated with the sharing of "anonymized" data sets.
By Marion Oswald, September 2013
PDF | HTML | In the Digital Library
![Personal, Pseudonymous, and Anonymous Data: The problem of identification](/images/DLImages/20.1 F3 Bourne thumb.png)
Why defining what counts as personal data is important for data protection and information sharing.
By Iain Bourne, September 2013
PDF | HTML | In the Digital Library
![The Tor Project: An inside view](/images/DLImages/20.1 F7 Misata TOR thumb.png)
A decade since the first version was released, Tor continues to be at the center of the debate around online privacy.
By Kelley Misata, September 2013
PDF | HTML | In the Digital Library
![It's Not About Winning, it's About Sending a Message: Hiding information in games](/images/DLImages/20.1 F8 Ritchey thumb.png)
New information hiding techniques use online games to transmit secrets covertly. The technique is simple, but the problem of detecting these covert channels is far from solved.
By Philip C. Ritchey, September 2013
PDF | HTML | In the Digital Library
![The XRDS Blog](/images/DLImages/Blog_toc1.jpg)
DEPARTMENT: Blogs
The newly launched XRDS blog highlights a range of topics from conference overviews to privacy and security, from HCI to cryptography. Selected blog posts, edited for print, will be featured in every issue. Please visit xrds.acm.org/blog to read each post in its entirety.
By Wolfgang Richter, Dimitris Mitropoulos, December 2012
PDF | HTML | In the Digital Library
![Big privacy](/images/DLImages/F6_feature2_toc.jpg)
SECTION: Features
Approaches from computer science and statistical science for assessing and protecting privacy in large, public data sets.
By Ashwin Machanavajjhala, Jerome P. Reiter, September 2012
PDF | HTML | In the Digital Library
![Invitation to complexity theory](/images/DLImages/18.3_F3_Goldreich_toc.jpg)
Complexity theory provides new viewpoints on various phenomena that were considered by past thinkers.
By Oded Goldreich, March 2012
PDF | HTML | In the Digital Library
![Games for extracting randomness](/images/DLImages/1012xrds_halprin-thumb.JPG)
SECTION: Features
Two computer scientists have created a video game about mice and elephants that can make computer encryption properly secure---as long as you play it randomly.
By Ran Halprin, Moni Naor, December 2010
PDF | HTML | In the Digital Library