Easy Email Encryption
In this IEEE Security & Privacy article, Steven M. Bellovin explains that with a little work and help from the five biggest Internet companies, we can have secure email.
In this IEEE Security & Privacy article, Steven M. Bellovin explains that with a little work and help from the five biggest Internet companies, we can have secure email.
The blockchain emerged as a novel distributed consensus scheme that allows transactions, and any other data, to be securely stored and verified without a centralized authority. For some time, the…
Online voting is sometimes heralded as a solution to all our election headaches. Proponents claim it eliminates hassle, provides better verification for voters and auditors, and may even increase voter…
Lorrie Cranor is a professor in the School of Computer Science and the Engineering and Public Policy Department at Carnegie Mellon University; director of the Carnegie Mellon Usable Privacy and…
In today’s electronics industry, chips are designed by globally dispersed teams, outsourced for fabrication, packaging, and testing, and distributed via complex supply chains. In such a scenario, how can chip…
Deborah Frincke is the Director of Research at the National Security Agency. As director, Frincke leads the NSA/CSS Research Directorate, with research personnel and world-class facilities in a range of…
The inaugural IEEE Cybersecurity Development conference (IEEE SecDev) will be held in Boston in early November. SecDev aims to bring together researchers and practioners to focus on how to “build…
The “Learning from Authoritative Security Experiment Results (LASER)” workshop series was established in 2012 with the purpose of publishing results for “properly conducted experimental (cyber) security research, including both successful as…
The GREPSEC workshop was launched in 2013 with the goal of encouraging female and underrepresented minority graduate students to participate in top security conferences. Here, Terry Benzel, Research Director and…
Do you have your passwords written down on sticky notes or, worse, did you email them to yourself? If so, you’re costing security experts, like IEEE Member Jungwoo Ryoo, a…