Tech and Computer

Tech and Computer news

 

 

Thu04042013

Last update06:42:42 PM GMT

Back Computer Science Encryption

Encryption

Self-assembling electronic nano-components

  • PDF
TechAndComputer (June 20, 2011) — Magnetic storage media such as hard drives have revolutionized the handling of information: huge quantities of data are magnetically stored while relying on highly sensitive electronic components. And data capacities are expected to increase further through ever smaller components. Together with experts from Grenoble and Strasbourg, researchers of KIT's Institute of Nanotechnology (INT) have now developed a nano-component based on a mechanism observed in nature.

What if the very tininess of a component prevented one from designing the necessary tools for its manufacture? One possibility could be to "teach" the individual parts to self-assemble into the desired product. For fabrication of an...

Don't stop anonymizing data: Report dispels myths of de-identification

  • PDF
TechAndComputer (June 16, 2011) — Canadian privacy experts have issued a new report on June 16 that strongly backs the practice of de-identification as a key element in the protection of personal information. The joint paper from Ontario's Information and Privacy Commissioner, Dr. Ann Cavoukian, and Dr. Khaled El Emam, the Canada Research Chair in Electronic Health Information at the University of Ottawa and the Children's Hospital of Eastern...

TechAndComputer (June 16, 2011) — Canadian...

Protecting medical implants from attack

  • PDF
TechAndComputer (June 15, 2011) — Millions of Americans have implantable medical devices, from pacemakers and defibrillators to brain stimulators and drug pumps; worldwide, 300,000 more people receive them every year. Most such devices have wireless connections, so that doctors can monitor patients' vital signs or revise treatment programs. But recent research has shown that this leaves the devices vulnerable to attack: In the worst-case...

TechAndComputer (June 15, 2011) — Millions of...

Quantum cryptography: Perfect eavesdropper illustrates overlooked loophole in secure communications technology

  • PDF
TechAndComputer (June 21, 2011) — Quantum key distribution (QKD) is an advanced tool for secure computer-based interactions, providing confidential communication between two remote parties by enabling them to construct a shared secret key during the course of their conversation.

QKD is perfectly secure in principle, but researchers have long been aware that loopholes may arise when QKD is put into practice. Now, for the first time, a team of...

TechAndComputer (June 21, 2011) — Quantum...

Leakage of private information from popular web sites is common, new study finds

  • PDF
TechAndComputer (June 2, 2011) — A study of more than 100 popular web sites used by tens of millions of people has found that three quarters directly leak either private information or users' unique identifiers to third-party tracking sites. The study, co-authored by Craig Wills, professor of computer science at Worcester Polytechnic Institute (WPI), also demonstrated how the leakage of private information by many sites, including email...

TechAndComputer (June 2, 2011) — A study of more...