Sign In

Communications of the ACM

Research Archive


Archives

The Research archive provides access to all Research articles published in past issues of Communications of the ACM.

September 2012


From Communications of the ACM

Technical Perspective: SQL on an Encrypted Database

There is some risk in trusting the cloud providers with sensitive data. Why not encrypt the data stored in cloud services?


From Communications of the ACM

Technical Perspective: Innovative Interaction: From Concept to the Wild

The history of the relationship between writing systems and technology is as long as it is varied. Likewise, the challenge of entering text using portable gadgets has a long history.


From Communications of the ACM

CryptDB: Processing Queries on an Encrypted Database

CryptDB: Processing Queries on an Encrypted Database

An ideal solution to satisfying the dual goals of protecting data confidentiality and running computations is to enable a server to compute over encrypted data, without the server ever decrypting the data to plaintext.


From Communications of the ACM

The Word-Gesture Keyboard: Reimagining Keyboard Interaction

The Word-Gesture Keyboard

As computing technologies expanded beyond the confines of the desktop, the need for effective text entry methods alternative to the ubiquitous desktop keyboards has inspired both academic researchers and the information technology…

Read CACM in a free mobile app!
Access the latest issue, plus archived issues and more
ACM Logo
  • ACM CACM apps available for iPad, iPhone and iPod Touch, and Android platforms
  • ACM Digital Library apps available for iOS, Android, and Windows devices
  • Download an app and sign in to it with your ACM Web Account
Find the app for your mobile device
ACM DL Logo