January/February 2018 issue of acmqueue

The January/February issue of acmqueue is out now

Privacy and Rights

  Download PDF version of this article PDF

ITEM not available


Originally published in Queue vol. 7, no. 9
see this item in the ACM Digital Library



Meng-Day (Mandel) Yu, Srinivas Devadas - Pervasive, Dynamic Authentication of Physical Items
The use of silicon PUF circuits

Nicholas Diakopoulos - Accountability in Algorithmic Decision-making
A view from computational journalism

Olivia Angiuli, Joe Blitzstein, Jim Waldo - How to De-identify Your Data
Balancing statistical accuracy and subject privacy in large social-science data sets

Whitfield Diffie, Susan Landau - Communications Surveillance
As the sophistication of wiretapping technology grows, so too do the risks it poses to our privacy and security.


(newest first)

pooja sharma | Sat, 23 Aug 2014 04:30:39 UTC

nice methodology of passport identification

finno | Thu, 21 Mar 2013 05:41:43 UTC

an authentication unit capable of processing an input, the authentication unit is capable of generating a dynamic card transaction code valid for a single transaction; and a RFID generator capable of generating at least a dynamic RFID key for a predefined limited time period by using the dynamic card transaction code for the single transaction, wherein the authentication of the input is performed locally with the authentication unit through an encrypted and unique RFID communication between the authentication unit and a third party by using a challenge response protocol, this is the system for securing a transaction.

Leave this field empty

Post a Comment:

© 2018 ACM, Inc. All Rights Reserved.