Public Key Cryptography: Secrecy in Public For centuries massive intellectual effort has gone into methods of...
Armageddon and the Cyberghost: Cyber-attacks as acts of war The states' right to retaliate against attack is a central...
Avoiding Collateral Damage: Protecting people, not just systems The internet is a great opportunity, but also a great...
Arithmetic by Computer and by Human Long multiplication, long division and logarithms are, for many, dim-remembered...