Tech and Computer

Tech and Computer news

 

 

Thu04042013

Last update06:42:42 PM GMT

Back Computer Science Encryption

Encryption

Not one, not two, not three, but four clones: First quantum cloning machine to produce four copies

  • PDF
TechAndComputer (Nov. 6, 2011) — Xi-Jun Ren and Yang Xiang from Henan Universities in China, in collaboration with Heng Fan at the Institute of Physics of the Chinese Academy of Sciences, have produced a theory for a quantum cloning machine able to produce several copies of the state of a particle at atomic or sub-atomic scale, or quantum state, in an article about to be published in The European Physical Journal D. The advance could have...

TechAndComputer (Nov. 6, 2011) — Xi-Jun Ren and Yang Xiang from Henan Universities in China, in collaboration with Heng Fan at the Institute of Physics of the Chinese Academy of Sciences, have produced a theory for a quantum cloning machine able to produce several copies of the state of a...

Internet security: Researchers break W3C standard

  • PDF
TechAndComputer (Oct. 19, 2011) — Standards are supposed to guarantee security, especially in the WWW. The World Wide Web Consortium (W3C) is the main force behind standards like HTML, XML, and XML Encryption. But implementing a W3C standard does not mean that a system is secure. Researchers from the chair of network and data security have found a serious attack against XML Encryption. "Everything is insecure," is the uncomfortable message from...

TechAndComputer (Oct. 19, 2011) —...

Smart phones: Keeping business data secure while allowing installation of personal apps

  • PDF
TechAndComputer (Oct. 7, 2011) — More and more companies are providing their employees with smartphones. While companies seek the best security available for their data, employees would also like to install apps of their own. Security experts have now developed equipment software with two separate areas: the business area and the personal area.

Researchers will unveil this development at the it-sa trade fair held October 11-13 in Nuremberg (Hall...

TechAndComputer (Oct. 7, 2011) — More...

Secure updates for navigation systems

  • PDF
TechAndComputer (Oct. 5, 2011) — At the push of a button by the driver, control units download the car manufacturer‘s new software – such as enhanced map material for the navigation system. To ensure that this data channel is protected from hacker attack, the system needs the right cryptographic key. To date, these keys have been stored in each one of a vehicle‘s electronic control units. Thanks to a new form of trust anchor, this will be s...

TechAndComputer (Oct. 5, 2011) —...

Most Canadians can be uniquely identified from their date of birth and postal code; New research unveils privacy risks

  • PDF
TechAndComputer (Aug. 8, 2011) — There are increasing pressures for health care providers to make individual-level data readily available for research and policy making. But Canadians are more likely to allow the sharing of their personal data if they believe that their privacy is protected. A new report by Dr. Khaled El Emam, the Canada Research Chair in Electronic Health Information at the University of Ottawa and the Children's Hospital of...

TechAndComputer (Aug. 8, 2011) — There are...