Sign In

Communications of the ACM

Research Archive


Archives

The Research archive provides access to all Research articles published in past issues of Communications of the ACM.

May 2014


From Communications of the ACM

Technical Perspective: The Interplay of Neuroscience and Cryptography

An ideal scheme for password storage would enable a password with more than 20 bits of randomness to be input and output from the brain of a human being who is unconscious of the process and thus unable to give away or reveal…


From Communications of the ACM

Neuroscience Meets Cryptography: Crypto Primitives Secure Against Rubber Hose Attacks

Neuroscience Meets Cryptography

We present a defense against coercion attacks using the concept of implicit learning from cognitive psychology. We use a carefully crafted computer game to allow a user to implicitly learn a secret password without them having…

Read CACM in a free mobile app!
Access the latest issue, plus archived issues and more
ACM Logo
  • ACM CACM apps available for iPad, iPhone and iPod Touch, and Android platforms
  • ACM Digital Library apps available for iOS, Android, and Windows devices
  • Download an app and sign in to it with your ACM Web Account
Find the app for your mobile device
ACM DL Logo