Showing 20 articles starting at article 21
< Previous 20 articles Next 20 articles >
Categories: Computer Science: Encryption, Engineering: Biometric
Published Keep it secret: Cloud data storage security approach taps quantum physics



Distributed cloud storage is a hot topic for security researchers, and a team is now merging quantum physics with mature cryptography and storage techniques to achieve a cost-effective cloud storage solution.
Published Accelerating AI tasks while preserving data security



SecureLoop is a new search engine that can identify an optimal design for a deep neural network accelerator that preserves data security while improving energy efficiency and boosting performance. This could enable device manufacturers to increase the speed of demanding AI applications, while ensuring sensitive data remain safe from attackers.
Published Monitoring nuclear weapons stockpiles with radio waves



Monitoring whether states are complying with disarmament treaties is not an easy task. An international team has been exploring remote monitoring with the help of two antennas and a couple of mirrors.
Published Cat-ching criminals with DNA from pet hairs



Cat hair could be the purr-fect way to catch criminals, according to researchers.
Published New study unveils stretchable high-resolution user-interactive synesthesia displays for visual--acoustic encryption



A research team has succeeded in developing a cutting-edge display using transfer-printing techniques, propelling the field of multifunctional displays into new realms of possibility.
Published Not the usual suspects: New interactive lineup boosts eyewitness accuracy



Allowing eyewitnesses to dynamically explore digital faces using a new interactive procedure can significantly improve identification accuracy compared to the video lineup and photo array procedures used by police worldwide, a new study reveals.
Published Better cybersecurity with new material


Digital information exchange can be safer, cheaper and more environmentally friendly with the help of a new type of random number generator for encryption. The researchers behind the study believe that the new technology paves the way for a new type of quantum communication.
Published How randomized data can improve our security


With an innovative approach, scientists are creating new standards for data security in the cache of electronic devices.
Published A new weapon in the war on robocall scams


The latest weapon in the war on robocalls is an automated system that analyzes the content of unsolicited bulk calls to shed light on both the scope of the problem and the type of scams being perpetuated by robocalls. The tool, called SnorCall, is designed to help regulators, phone carriers and other stakeholders better understand and monitor robocall trends -- and take action against related criminal activity.
Published Smart devices: Putting a premium on peace of mind


The White House has announced plans to roll out voluntary labeling for internet-connected devices like thermostats and baby monitors that meet certain cybersecurity standards. A new survey of U.S. consumers shows that they are willing to pay a significant premium to tell which gadgets are safe from security attacks before they buy. But voluntary product labels may not be enough if the program is going to protect consumers in the long run, the findings suggest.
Published Engineering team uses diamond microparticles to create high security anti-counterfeit labels



Researchers have developed a pioneering technological solution that counterfeiters have no response to.
Published Why computer security advice is more confusing than it should be


If you find the computer security guidelines you get at work confusing and not very useful, you're not alone. A new study highlights a key problem with how these guidelines are created, and outlines simple steps that would improve them -- and probably make your computer safer.
Published Researchers visualize activity of CRISPR genetic scissors



Scientists have developed a new method to measure the smallest twists and torques of molecules within milliseconds. The method makes it possible to track the gene recognition of CRISPR-Cas protein complexes, also known as 'genetic scissors', in real time and with the highest resolution. With the data obtained, the recognition process can be accurately characterized and modeled to improve the precision of the genetic scissors.
Published Solving rare disease mysteries ... and protecting privacy


Researchers have demonstrated a new way of linking personal records and protecting privacy. The first application is in identifying cases of rare genetic disorders. There are many other potential applications across society.
Published Stressed for a bit? Then don't click it, cybersecurity experts advise



Workers feeling a specific form of stress are more likely than others to become the victims of a phishing attack, according to a new study.
Published Evaluating cybersecurity methods



Researchers created a generic framework that enables an engineer or scientist to evaluate the effectiveness of defense schemes that seek to limit a hacker's ability to learn secret information by observing the behavior of a victim computer program.
Published How secure are voice authentication systems really?



Computer scientists have discovered a method of attack that can successfully bypass voice authentication security systems with up to a 99% success rate after only six tries.
Published New cyber software can verify how much knowledge AI really knows



With a growing interest in generative artificial intelligence (AI) systems worldwide, researchers have created software that is able to verify how much information an AI farmed from an organization's digital database.
Published Can investigators use household dust as a forensic tool?



It is possible to retrieve forensically relevant information from human DNA in household dust.
Published New research suggests peer-advisor relationship is key to success


Collaborative research across the country has shown that strengthening the relationship between the student and advisor can increase retention rates in engineering doctoral studies.