Nothing Special   »   [go: up one dir, main page]

skip to main content
Volume 18, Issue 4July-August 2020Keys and Identity
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
ISSN:1542-7730
EISSN:1542-7749
Published In:
queue
Reflects downloads up to 21 Nov 2024Bibliometrics
Skip Table Of Content Section
DEPARTMENT: Drill Bits
Efficient Graph Search

Welcome to Drill Bits, a new column about programming. This inaugural episode shows how graph search algorithms can avoid unnecessary work. A simple modification to classic breadth-first search improves the lower bound on its running time: Whereas ...

FEATURE: Features
research-article
Open Access
Security Analysis of SMS as a Second Factor of Authentication: The challenges of multifactor authentication based on SMS, including cellular security deficiencies, SS7 exploits, and SIM swapping

Despite their popularity and ease of use, SMS-based authentication tokens are arguably one of the least secure forms of two-factor authentication. This does not imply, however, that it is an invalid method for securing an online account. The current ...

research-article
Open Access
The Identity in Everyone's Pocket: Keeping users secure through their smartphones

Newer phones use security features in many different ways and combinations. As with any security technology, however, using a feature incorrectly can create a false sense of security. As such, many app developers and service providers today do not use ...

research-article
Open Access
The Die is Cast: Hardware Security is Not Assured

The future of hardware security will evolve with hardware. As packaging advances and focus moves to beyond Moore's law technologies, hardware security experts will need to keep ahead of changing security paradigms, including system and process ...

DEPARTMENT: Kode Vicious
column
Open Access
Removing Kode: Dead functions and dead features

Removing dead code from systems is one of KV's favorite koding pastimes because there is nothing quite like that feeling you get when you get rid of something you know wasn't being used. Code removal is like cleaning house, only sometimes you clean house ...

DEPARTMENT: Commit to Memory
column
Open Access
Out-of-this-World Additive Manufacturing: From thingamabobs to rockets, 3D printing takes many forms.

Popular culture uses the term 3D printing as a synonym for additive manufacturing processes. In 2010, the American Society for Testing and Materials group came up with a set of standards to classify additive manufacturing processes into seven categories. ...

Subjects

Comments

Please enable JavaScript to view thecomments powered by Disqus.