September/October 2018 issue of acmqueue The September/October issue of acmqueue is out now

Subscribers and ACM Professional members login here

Privacy and Rights

  Download PDF version of this article PDF

Error 526 Ray ID: 47c023847fabc5f6 • 2018-11-19 05:04:54 UTC

Invalid SSL certificate








What happened?

The origin web server does not have a valid SSL certificate.

What can I do?

If you're a visitor of this website:

Please try again in a few minutes.

If you're the owner of this website:

The SSL certificate presented by the server did not pass validation. This could indicate an expired SSL certificate or a certificate that does not include the requested domain name. Please contact your hosting provider to ensure that an up-to-date and valid SSL certificate issued by a Certificate Authority is configured for this domain name on the origin server. Additional troubleshooting information here.


Originally published in Queue vol. 7, no. 9
see this item in the ACM Digital Library



Meng-Day (Mandel) Yu, Srinivas Devadas - Pervasive, Dynamic Authentication of Physical Items
The use of silicon PUF circuits

Nicholas Diakopoulos - Accountability in Algorithmic Decision-making
A view from computational journalism

Olivia Angiuli, Joe Blitzstein, Jim Waldo - How to De-identify Your Data
Balancing statistical accuracy and subject privacy in large social-science data sets

Whitfield Diffie, Susan Landau - Communications Surveillance
As the sophistication of wiretapping technology grows, so too do the risks it poses to our privacy and security.


(newest first)

pooja sharma | Sat, 23 Aug 2014 04:30:39 UTC

nice methodology of passport identification

finno | Thu, 21 Mar 2013 05:41:43 UTC

an authentication unit capable of processing an input, the authentication unit is capable of generating a dynamic card transaction code valid for a single transaction; and a RFID generator capable of generating at least a dynamic RFID key for a predefined limited time period by using the dynamic card transaction code for the single transaction, wherein the authentication of the input is performed locally with the authentication unit through an encrypted and unique RFID communication between the authentication unit and a third party by using a challenge response protocol, this is the system for securing a transaction.

Leave this field empty

Post a Comment:

© 2018 ACM, Inc. All Rights Reserved.