Sign In

Communications of the ACM

Table of Contents

1995 observations on supercomputing alternatives: did the MPP bandwagon lead to a cul-de-sac?

ISO 9000 reflects the best in standards

A new view of intellectual property and software

How to use key escrow

A taxonomy for key escrow encryption systems

Commercial key recovery

Crypto backup and key escrow

The Yaksha security system

The computer scientist as toolsmith II

How we profess: the ethical systems analyst

The demographics of candidates for faculty positions in computer science

Programming parallel algorithms

Report on NIIP

Taking responsibility for our risks