Sign In

Communications of the ACM

BLOG@CACM


Refine your search:
dateMore Than a Year Ago
subjectSecurity
authorJason I. Hong

­Usable Privacy and Security
From BLOG@CACM

­Usable Privacy and Security

We are facing an increasing number of security failures, not because of problems with encryption algorithms, network protocols, or system implementations, but rather...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account