Digital Twins and Dependency/Constraint-Aware AI for Digital Manufacturing
Security and Privacy
Learning and Evidence Analytics Framework Bridges Research and Practice for Educational Data Science
The Future of Blockchain Consensus
CLOSET: Data-Driven COI Detection and Management in Peer-Review Venues
The Veracity Grand Challenge in Computing: A Perspective from Aotearoa New Zealand
Keeping Hackers Off the Electrical Grid
The Silent (R)evolution of SAT
Buffer-Bloated Router? How to Prevent It and Improve Performance
Technical Perspective: What Does Provable Security Mean for Cryptographic Schemes?
For a given cryptographic scheme, as perfect security is almost never achievable, one requires a computational assumption. Computational assumptions are some well-defined problems that are widely accepted as difficult.
On the (In)Security of ElGamal in OpenPGP
We reveal that in the interoperable world of OpenPGP, unforeseen cross-configuration attacks become possible.
Standards to Secure the Sensors That Power IoT
Computer-Related Risks and Remediation Challenges
Breaking Up a Digital Monopoly
Trust Is Not Enough: Accuracy, Error, Randomness, and Accountability in an Algorithmic Society
Navigating the 2023 Cybersecurity Landscape
Beyond Passwords: The Path to Stronger Authentication Mechanisms
Disentangling Hype from Practicality: On Realistically Achieving Quantum Advantage
Unlocking the Potential of Fully Homomorphic Encryption
AlphaFold Spreads through Protein Science
Locking Down Secure Open Source Software
Shape the Future of Computing
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get InvolvedCommunications of the ACM (CACM) is now a fully Open Access publication.
By opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.
Learn More