
Computer Scientists Develop 'Mathematical Jigsaw Puzzles' to Encrypt Software
Computer science experts
have designed a system to
encrypt software so that it
only allows someone to use a
program as intended while
... > full story

How to Keep Kids Engaged With Educational Games
If you want teams of
students to stay engaged
while playing educational
games, you might want them
to switch seats pretty
often. That's one finding
... > full story

Solar Tsunami Used to Measure Sun's Magnetic Field
A solar tsunami observed by
NASA's Solar Dynamics
Observatory and the Japanese
Hinode spacecraft has been
used to provide the first
accurate estimates of the
... > full story

New Hardware Design Protects Data in the Cloud
A new hardware design makes
data encryption more secure
by disguising cloud servers'
memory-access patterns. ... > full story
Browse News Stories
1 to 10 of 627 stories
view headlines only
-
Technology Could Be 'Aggravating' Factor in Sentencing
July 23, 2013 Existing criminal offenses which feature the use of computers could be treated in the same way as offenses involving driving, researchers ... > full story -
ID Got You, Under the Skin
July 11, 2013 Forget fingerprints or iris recognition, the next big thing in biometrics will be a thermal imaging scan that maps the blood vessels under the skin of your face for instantaneous face recognition ... > full story -
Computer Modeling
Computer Science
Information Technology
Hacking
Artificial Intelligence
Computers and Internet
Teaching a Computer to Play Concentration Advances Security, Understanding of the Mind
July 1, 2013 Computer science researchers have programmed a computer to play the game Concentration (also known as Memory). The work could help improve computer security -- and improve our understanding of how ... > full story -
App to Protect Private Data on iOS Devices Finds Almost Half of Other Apps Access Private Data
June 20, 2013 Almost half of the mobile apps running on Apple's iOS operating system access the unique identifier of the devices where they're downloaded, computer scientists have found. In addition, more than 13 ... > full story -
Protection for Whistleblowers: New System Would Allow for Secret Data Transfer
June 19, 2013 Scientists are developing a system that would make it possible for an individual to submit data over the Internet while remaining ... > full story -
Making Memories: Practical Quantum Computing Moves Closer to Reality
June 19, 2013 Researchers have developed a new way to design quantum memory, bringing quantum computers a step closer to ... > full story -
Spintronics Approach Enables New Quantum Technologies
June 4, 2013 Researchers highlight the power of emerging quantum technologies in two recent articles. New technologies exploit quantum mechanics, the physics that dominates the atomic world, to perform disparate ... > full story -
Hacking
Encryption
Information Technology
Artificial Intelligence
Computers and Internet
Computer Programming
Android Antiviral Products Easily Evaded
May 30, 2013 Think your antivirus product is keeping your Android safe? Think again. Ten of the top Android antiviral products are rendered useless by the simplest ... > full story -
When Friends Create Enemies: Facebook's Mutual-Friends Feature May Create Security Risks, Privacy Concerns
May 30, 2013 Often revered for bringing people together, the mutual-friends feature on Facebook actually creates myriad security risks and privacy concerns according to a new ... > full story -
Just How Secure Is Quantum Cryptography?
May 28, 2013 Unlike classical encryption, quantum communication systems are known to offer the promise of virtually unbreakable encryption. Now, new research on this topic is shaking up the long-held notion that ... > full story
Search ScienceDaily
Number of stories in archives: 140,672

