Unlocking the Potential of Zero-Knowledge Proofs in Blockchain
Security and Privacy
Protecting Life-Saving Medical Devices From Cyberattack
Creating the First Confidential GPUs
Hardware VM Isolation in the Cloud
Confidential Computing: Elevating Cloud Security and Privacy
Multiple Data Leaks at 23andme
All Photos are Fake Until Proven Real
Technical Perspective: A Rare Glimpse of Tracking Fake Reviews
Using Psychology to Bolster Cybersecurity
Certification of Safety-Critical Systems
New Threats to Society from Free-Speech Social Media Platforms
Leveraging Social Media to Buy Fake Reviews
The Life-or-Death Importance of Medical Device Security
Shining a Light on the Dark Web
We Need to Focus on How Our Data Is Used, Not Just How It Is Shared
Shape the Future of Computing
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get InvolvedCommunications of the ACM (CACM) is now a fully Open Access publication.
By opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.
Learn More