Post List

All posts; Tags Include "Encryption"

(Modify Search »)

  • July 29, 2015
  • 03:09 PM

The “Invisible Web” Undermines Health Information Privacy

by Jalees Rehman in The Next Regeneration

What do the third parties do with your data? We do not really know because the laws and regulations are rather fuzzy here. We do know that Google, Facebook and Twitter primarily make money by advertising so they could potentially use your info and customize the ads you see. Just because you visited a page on breast cancer does not mean that the "Invisible Web" knows your name and address but they do know that you have some interest in breast cancer. It would make financial sense to sen........ Read more »

  • April 13, 2014
  • 12:59 PM

The Curse of the Internet

by Aurametrix team in Health Technologies

It's hard to imagine our lives without the Internet  - either mobile or desktop. The Internet has become a catalyst of innovation, an essential tool in business and social life. It brought new levels of participation and access to knowledge. It enabled new forms of interaction, albeit mostly utilized for entertainment purposes. But despite all the advantages and conveniences, does the Internet really serve us or is it the other way around?... Read more »

  • January 27, 2012
  • 11:00 AM

Watermarking molecules

by Aaron Sterling in Nanoexplanations

I’ve posted twice about Anonymous hacking into Stratfor — and, more generally, their hacktivism has been making bigger and bigger waves.  CNN recently ran a fairly positive story on the support hacktivists are providing the Occupy movement.  Many of these … Continue reading →... Read more »

Joachim J. Eggers, W.D. Ihlenfeldt, & Bern Girod. (2001) Digital Watermarking of Chemical Structure Sets. Information Hiding, 200-214. DOI: 10.1007/3-540-45496-9_15  

  • January 26, 2012
  • 03:18 PM

Spin Silk Like a Spider! No Legs Required (Just Microfluidics)

by Hector Munoz in Microfluidic Future

Biomimetics. I love that word. Well, probably not as much as microfluidics, but it’s a close second. If you’re unfamiliar with the word, it basically refers to design that mimics biology. Biological systems have evolved into finely tuned machines, why not mimic them in order to synthesize what we need? Biomimetics isn’t new, it’s been around in one form or another for a long time (my favorite instance is Velcro), but our capabilities are broadening as we are able to manuf........ Read more »

  • January 13, 2012
  • 11:00 AM

Password analysis from the Stratfor hack

by Aaron Sterling in Nanoexplanations

I will return to blogging about theoretical computer science and algorithm-related mathematics next week, but I wanted to take a few minutes today to mention a rare research opportunity that has arisen as a result of the hack of the … Continue reading →... Read more »

Moshe Zviran, & William J. Haga. (1999) Password Security: An Empirical Study. Journal of Management Information Systems, 15(4), 161-185. info:/

  • September 11, 2010
  • 03:36 PM

when bad quantum physics invade military news

by Greg Fish in weird things

As said by Futurama’s mad scientist at large, Professor Farnsworth, quantum mechanics mean that anything can happen for any reason or without one. Of course this was really a swipe at how so many of us tend to see the complex physics of quantum objects, and it’s a very valid one since there’s a seemingly [...]... Read more »

Jin, X., Ren, J., Yang, B., Yi, Z., Zhou, F., Xu, X., Wang, S., Yang, D., Hu, Y., Jiang, S.... (2010) Experimental free-space quantum teleportation. Nature Photonics, 4(6), 376-381. DOI: 10.1038/nphoton.2010.87  

  • August 30, 2010
  • 04:44 PM

Hacking Commercial Quantum Cryptography Systems by Illumination

by Olexandr Isayev in

Quantum hackers have performed the first 'invisible' attack on two commercial quantum cryptographic systems. By using lasers on the systems — which use quantum states of light to encrypt information for transmission — they have fully cracked their encryption keys, yet left no trace of the hack.... Read more »

  • April 28, 2010
  • 10:00 AM

Peer-to-peer data storage

by David Bradley in Sciencetext

Whenever anyone mentions P2P file systems, the first thought that pops into the n00bs head is probably – piracy – and an image of teens downloading free copies of the latest young person’s popular music tracks from teh interwebs using an illicit file sharing system. Of course, Bit Torrent and other related systems can be [...]Post from: David Bradley's Sciencetext Tech TalkPeer-to-peer data storage
... Read more »

Yu-Wei Chan, Tsung-Hsuan Ho, Po-Chi Shih, & Yeh-Ching Chung. (2010) Malugo: A peer-to-peer storage system. Int. J. Ad Hoc and Ubiquitous Computing, 5(4), 209-218. info:/

  • April 6, 2010
  • 10:00 AM

Antivirus without the software

by David Bradley in Sciencetext

UK research suggests that approximately 97% of businesses have an internet connection and the vast majority of those are now using broadband access. The same research also found that infection with computer viruses, spyware, worms, Trojans, and other malicious software was the biggest single cause of security incidents, accounting for about half of all incidents, [...]Post from: David Bradley's Sciencetext Tech TalkAntivirus without the software
... Read more »

Athanasios Karantjias, & Nineta Polemi. (2010) Assessment of advanced cryptographic antiviral techniques. Int. J. Electronic Security and Digital Forensics, 3(1), 60-72. info:/

join us!

Do you write about peer-reviewed research in your blog? Use to make it easy for your readers — and others from around the world — to find your serious posts about academic research.

If you don't have a blog, you can still use our site to learn about fascinating developments in cutting-edge research from around the world.

Register Now

Research Blogging is powered by SRI Technology.

To learn more, visit