(Translated by https://www.hiragana.jp/)
ScienceDaily: Computers & Math -- Computer Security News
The Wayback Machine - https://web.archive.org/web/20060822021551/http://www.sciencedaily.com:80/news/computers_math/encryption/

Computers & Math:
Computer Security News

 RSS  newsfeed for this page:


Latest News

Health & Medicine

Mind & Brain

Plants & Animals

Earth & Climate

Space & Time

Matter & Energy

Computers & Math

Computer Science
Mathematics

Fossils & Ruins

Summaries | Headlines

Cardiff Researchers Discover Online Banking Security Problem (August 10, 2006) -- Two researchers working within Cardiff University's School of Computer Science, Professor Antonia J Jones and Joseph R Rabaiotti, together with a third independent researcher Stuart P Goring, have ... > full story

Cornell Sleuths Crack Secret Codes Of Europe's Galileo Satellite (July 9, 2006) -- Members of Cornell's Global Positioning System (GPS) Laboratory have cracked the so-called pseudo random number (PRN) codes of Europe's first global navigation satellite, despite efforts to keep the ... > full story

New Ion Trap May Lead To Large Quantum Computers (July 6, 2006) -- NIST physicists have designed and built a novel electromagnetic trap for ions that could be easily mass produced to potentially make quantum computers large enough for practical use. The new trap may ... > full story

Protecting Sensitive Data: Researchers Develop Fail-Safe Techniques For Erasing Magnetic Storage Media (June 15, 2006) -- What if you absolutely, positively must delete all data from a computer drive -- beyond any hope of recovering it? That was the challenge facing scientists at the Georgia Tech Research Institute ... > full story

Finding Computer Files Hidden In Plain Sight (May 24, 2006) -- Criminals and terrorists are using innocent-looking digital images as a cover to send hidden data. Researchers at the Ames Laboratory's Midwest Forensics Resource Center have developed a method to ... > full story

New Software Protects Confidentiality Of Data While Enabling Access And Sharing (May 2, 2006) -- Penn State researchers have developed software that allows databases to "talk to each other" automatically without compromising the security of the data and metadata because the queries, data ... > full story

Hackers Beware - New Technique Uses Photons, Physics To Foil Codebreakers (February 23, 2006) -- For governments and corporations in the business of transmitting sensitive data such as banking records or personal information over fibre optic cables, a new system demonstrated by University of ... > full story

New Technologies Enhance Quantum Cryptography (February 2, 2006) -- A team of Los Alamos National Laboratory scientists, in collaboration with researchers from the National Institute of Standards and Technology in Boulder, Colo., and Albion College, in Albion, Mich., ... > full story

Toward A Quantum Computer, One Dot At A Time (January 20, 2006) -- Researchers at the University of Pittsburgh have developed a way to create semiconductor islands smaller than 10 nanometers in scale, known as quantum dots. The islands, made from germanium and ... > full story

Software 'Agents' Could Help Unmask Reality Of Disease Clusters (September 7, 2005) -- Concerns over the privacy of patients could be hampering efforts to spot disease clusters and monitor the health effects of environmental pollution, according to researchers in the latest edition of ... > full story

NIST Demonstrates Better Memory With Quantum Computer Bits (August 11, 2005) -- Physicists at the National Institute of Standards and Technology (NIST) have used charged atoms (ions) to demonstrate a quantum physics version of computer memory lasting longer than 10 seconds -- ... > full story

Quantum Decoys Foil Code-breaking Attempts (July 19, 2005) -- Computer code-makers may soon get the upper hand on code-breakers thanks to a new quantum cryptography method designed at the University of Toronto. Quantum cryptography uses particles of light to ... > full story

< more recent summaries | earlier summaries >

 

Can't find it? Try searching ScienceDaily or the entire web with:

Google
 
Web ScienceDaily.com


 

 

Cryptography -- Cryptography is the field concerned with linguistic and mathematical techniques for securing information, particularly in communications. The study of how to circumvent the use of cryptography is ... > full article

Computer insecurity -- Many current computer systems have a very poor level of computer security. This computer insecurity article describes the current battlefield of computer security exploits and ... > full article

Computer security -- Computer security is a field of computer science concerned with the control of risks related to computer ... > full article

Cyber security standards -- Cyber security standards are security standards which enable organizations to practice safe security techniques in order to minimize the number of successful cyber security ... > full article

Identity theft -- Identity theft (or identity fraud) is the deliberate assumption of another person's identity, usually to gain access to their finances or frame them for a ... > full article

Computer virus -- In computer security technology, a virus is a self-replicating/self-reproducing-automation program that spreads by inserting copies of itself into other executable code or documents. In order to ... > full article

Malware -- Malware ("malicious software") is software designed to infiltrate or damage a computer system, without the owner's consent. The term describes the intent of the creator, rather than any particular ... > full article

Computing -- Originally, the word computing was synonymous with counting and calculating, and a science that deals with the original sense of computing mathematical ... > full article

Wi-Fi -- Wi-Fi (also WiFi, Wi-fi, Wifi, or wifi) is a brand licensed by the Wi-Fi Alliance to products which pass testing demonstrating that they implement a set of product compatibility standards for ... > full article

Computer software -- Computer software (or simply software) is that part of a computer system that consists of encoded information (or computer instructions), as opposed to the physical computer equipment (hardware) ... > full article

MySQL (3rd Edition) (Developer's Library)
The unexpected pleasure of reading books about databases is that they are often written by authors with highly organized minds. Paul DuBois and his editors at New Riders have assembled MySQL with a ... > read more

The Little SAS Book: A Primer, Third Edition
Getting started with SAS is easy with The Little SAS Book. This friendly, easy-to-read guide gently introduces you to the most commonly used features of SAS software plus a whole lot more! The book ... > read more

Programming the Universe : A Quantum Computer Scientist Takes On the Cosmos
Is the universe actually a giant quantum computer? According to Seth Lloyd—Professor of Quantum-Mechanical Engineering at MIT and originator of the first technologically feasible design for a ... > read more

Technology In Action- Introductory (2nd Edition)
This book was designed to spark reader interest by covering practical concepts that they want to learn (such as setting up a wireless network in their home) while giving background information (such ... > read more

Decoding the Universe: How the New Science of Information Is Explaining Everything in the Cosmos, from Our Brains to Black Holes
As Charles Seife reveals in this energetic new book, information theory, once the province of philosophers and linguists, has emerged as the crucial science of our time, shedding new light on the ... > read more

National Electrical Code 2002 (softcover) (National Fire Protection Association National Electrical Code)
The #1 electrical reference, the 2002 National Electrical CodeŽ, is now available through today's #1 electrical publisher, Delmar Publishers! The single most important reference in the ... > read more

Getting to Know ArcGIS Desktop: The Basics of ArcView, ArcEditor, and ArcInfo Updated for ArcGIS 9 (Getting to Know series)
With revised material and new exercises based on ArcGIS version 9, this updated work acquaints geographers and GIS professionals with the principles of GIS as it teaches the mechanics of using ArcGIS ... > read more

Curves
If you don't mind wading through subtly persistent salesmanship throughout the book, the Curves guide has a wealth of practical advice that clearly continues to help women around the world achieve ... > read more

Bayesian Data Analysis, Second Edition
Incorporating new and updated information, this second edition of THE bestselling text in Bayesian data analysis continues to emphasize practice over theory, describing how to conceptualize, ... > read more

Fear Less: Real Truth About Risk, Safety, and Security in a Time of Terrorism
In this age of uncertainty we are all looking for answers. Every day we cope with another report. Anthrax in New York, Florida and Washington, D.C. Arrests nationwide. Threats from Afghanistan. While ... > read more

 
Text: small | med | large
Also search ScienceDaily or the web with Google:
ScienceDaily.com
Web
 
 

In Other News ...

... more breaking news at NewsDaily -- updated every 15 minutes

Health & Medicine Mind & Brain Plants & Animals Space & Time Earth & Climate Matter & Energy Computers & Math Fossils & Ruins