BT

InfoQ Homepage Cryptography Content on InfoQ

Articles

RSS Feed
  • The Current State of Blockchain - Panel Discussion (Part 2)

    The final two panelists introduce themselves and share their views of the current state of the Blockchain world. We're joined by Richard Brown, CTO at R3 and David Gerard, journalist and author of "Attack of the 50 Foot Blockchain"

  • The Current State of Blockchain - Panel Discussion (Part 1)

    The first two panelists introduce themselves and give their view of the current state of blockchain. John Davies, CTO and co-founder of Velo Payments, and Conor Svensson, author of the web3j library for interacting with the Ethereum blockchain, give their view on the current state of blockchain.

  • Mastering Blockchain: Book Review and Author Q&A

    Blockchain was invented in 2008 for Bitcoin to solve the main issue with digital currencies, i.e., the possibility that a token be spent more than once by duplicating it. Packt Publishing Mastering Blockchain by Imran Bashir aims to provide a comprehensive introduction to Blockchain, a technology that is claimed to be able to revolutionise our society and impact every industry.

  • Cryptocurrency and Online Multiplayer Games

    The era of cryptocurrency opens new possibilities for game publishers and developers. However, it is not yet a fully-developed market and there are many things that should be taken into account before entering it. This article reviews the main pros and cons of entering this new and highly volatile field.

  • Cloud Data Auditing Techniques with a Focus on Privacy and Security

    The authors provide a guide to the current literature regarding comprehensive auditing methodologies. They not only identify and categorize the different approaches to cloud data integrity and privacy but also compare and analyze their relative merits. For example, their research lists the strengths and weaknesses of earlier work on cloud auditing, which allows researchers to design new methods.

  • Philipp Jovanovic on NORX, IoT Security and Blockchain

    In this interview, originally published on InfoQ France, Mathieu Bolla talks to Philipp Jovanovic, a Cryptographer at EPFL, about NORX, IoT Security and keeping yourself safe on-line, and Blockchain.

  • Securing the Modern Software Delivery Lifecycle

    Information security practice has evolved to be pretty good at granting and managing access to confidential information - by people. But automation is taking over, requiring a shift in how we think about securing our infrastructure and applications.

  • Answering Common Cloud Security Questions from CIOs

    With the news stories of possible data breaches at enterprises like Target, and the current trend of companies migrating to cloud environments for the flexibility, scalability, agility, and cost-effectiveness they offer, CIOs have been asking hard questions about cloud security.

  • Keeping Your Secrets

    Dennis Sosnoski explains how supposedly-secure connections can be downgraded to the point where they are easily broken and how even at full strength most forms of encryption are vulnerable to data capture and later decryption if your private keys are exposed. In this article you'll learn some ways of making it more difficult for anyone to see or alter your data exchanges.

  • Automating Data Protection Across the Enterprise

    This article builds on the foundational Regulatory Compliant Cloud Computing (RC3) architecture for application security in the cloud by defining a Data Encryption Infrastructure(DEI) which is not application specific. DEI encompasses technology components and an application architecture that governs the protection of sensitive data within an enterprise.

  • Encrypting the Internet

    The authors, from Intel, offer a three pronged approach to providing secure transmission of high volume HTML traffic: new CPU instructions to accelerate cryptographic operations; a novel implementation of the RSA algorithm to accelerate public key encryption; and using SMT to balance web server and cryptographic operations. Their approach, they claim, leads to significant cost savings.

  • Automating File Uploads with SSH and Ruby

    In this article, Matthew Bass guides you step-by-step through the process of creating your own version of a Ruby script to automate file uploads using SSH. Complete source code examples are included, with line-by-line analysis of what the code is doing. A good introduction to Ruby as a powerful scripting language.

BT

Is your profile up-to-date? Please take a moment to review and update.

Note: If updating/changing your email, a validation request will be sent

Company name:
Company role:
Company size:
Country/Zone:
State/Province/Region:
You will be sent an email to validate the new email address. This pop-up will close itself in a few moments.