SECTION: Features
Email has been declared dead many times but refuses to die. There is a new effort underway to make encrypted end-to-end email communication as automatic as possible. It is part of a diverse set of efforts to reinvigorate the email ecosystem, which remains a crucial cornerstone of a functioning, open internet.
By Holger Krekel, Karissa McKelvey, Emil Lefherz, July 2018
PDF | HTML | In the Digital Library
FEATURE: Features
The multitude of IoT devices contributes to the enormous amount of data stored on corporate clouds. Yet the level of computing power has outpaced advances in privacy protection. Could encrypted search preserve the privacy of data, while utilizing the computing power of the cloud?
By Hossein Shafagh, December 2015
PDF | HTML | In the Digital Library
SECTION: Features
There are unique challenges posed by cryptography research. This interview examines potential threats to modern security techniques and how to overcome them.
By Shashank Agrawal, Billy Rathje, March 2015
PDF | HTML | In the Digital Library
The need to embed search functionality into every aspect of technology has produced an abundance of information that is difficult to secure. Can advances in cryptography resolve the inherent conflicts of big data?
By Seny Kamara, March 2015
PDF | HTML | In the Digital Library
Modern cryptography provides techniques to perform useful computations on sensitive data.
By Mike Rosulek, March 2015
PDF | HTML | In the Digital Library
SECTION: Features
The line between personal and anonymous information is often unclear. Increasingly it falls to lawyers to understand and manage the risks associated with the sharing of "anonymized" data sets.
By Marion Oswald, September 2013
PDF | HTML | In the Digital Library
Why defining what counts as personal data is important for data protection and information sharing.
By Iain Bourne, September 2013
PDF | HTML | In the Digital Library
A decade since the first version was released, Tor continues to be at the center of the debate around online privacy.
By Kelley Misata, September 2013
PDF | HTML | In the Digital Library
New information hiding techniques use online games to transmit secrets covertly. The technique is simple, but the problem of detecting these covert channels is far from solved.
By Philip C. Ritchey, September 2013
PDF | HTML | In the Digital Library
DEPARTMENT: Blogs
The newly launched XRDS blog highlights a range of topics from conference overviews to privacy and security, from HCI to cryptography. Selected blog posts, edited for print, will be featured in every issue. Please visit xrds.acm.org/blog to read each post in its entirety.
By Wolfgang Richter, Dimitris Mitropoulos, December 2012
PDF | HTML | In the Digital Library
SECTION: Features
Approaches from computer science and statistical science for assessing and protecting privacy in large, public data sets.
By Ashwin Machanavajjhala, Jerome P. Reiter, September 2012
PDF | HTML | In the Digital Library
Complexity theory provides new viewpoints on various phenomena that were considered by past thinkers.
By Oded Goldreich, March 2012
PDF | HTML | In the Digital Library
SECTION: Features
Two computer scientists have created a video game about mice and elephants that can make computer encryption properly secure---as long as you play it randomly.
By Ran Halprin, Moni Naor, December 2010
PDF | HTML | In the Digital Library