August, 2003

Security: Secrets, Intruders and ID Tags
51 pages

This report examines the current state of security technologies, organizes key issues and puts them in context, and succinctly explains how the technologies work.

Security researchers are aiming to protect computer data, hardware, and software from intruders. They are finding methods of tracking data, objects, and people. And they are exploring ways to protect privacy on the Internet and in the real world.

The technologies involved include cryptography, data hiding methods, data finding methods, information privacy, hardware security, system recovery, Internet security, property protection, intelligent tracking, and biometrics.

Security methods run the gamut from finding twists on encryption schemes, to gleaning secret information from patterns, to constructing cheap plastic tags that can be used to identify objects, to making microscopic glowing beads that can be used to hide information in a document.

The report includes an executive summary, a list of 23 developments to look for as these cutting-edge technologies take shape, and a section of 31 researchers to watch, including links to their Web pages. It also includes a quick tour of 41 recent developments in seven areas and a section of 33 in-depth news stories from TRN.

The stories are organized into seven categories: cryptography, quantum cryptography, data hiding, systems and software defenses, Internet vulnerabilities, privacy protection, and physical security.

TRN's Making the Future reports contain live links, and can be read on a computer, printed and archived.

Buy the the Security report for $89.
. You will receive download instructions via email.

Report Sections

Executive Summary:
319 words

Main Report:
4,294 words

How It Works:
1,016 words

In-Depth Stories:
33 stories, including 6 images

Table of Contents:

Main Report
Knowing Who’s Who
Data, systems and objects
Keeping secrets
Scrambling well
Cracking codes
DNA computers
Quantum computers
Quantum Cryptography
Splitting up the secret
Hiding data in plain sight
Finding hidden data
Securing systems
Recovering from an attack
Securing the ‘Net
Exploiting the Internet
Protecting property
High visibility
Perpetually pursuing perfect security

How It Works

Two sides of cryptography
Computing security
Security in probabilities
Quantum cryptography
Boosting privacy

In-Depth Story Categories
Quantum cryptography
Data hiding
Systems and software defenses
Internet vulnerabilities
Privacy protection
Physical security

Take a look at all available Making the Future reports.

View a four-page sample of the Making the Future report (pdf).

Home     Archive     Resources    Feeds     Offline Publications     Glossary
TRN Finder     Research Dir.    Events Dir.      Researchers     Bookshelf
   Contribute      Under Development     T-shirts etc.     Classifieds
Forum    Comments    Feedback     About TRN

© Copyright Technology Research News, LLC 2000-2005. All rights reserved.