Decentralized Computing

The Die Is Cast. Hardware Security Is Not Assured

Security Analysis of SMS as a Second Factor of Authentication

Ten Unfair Optimizations on Linear Search

Efficient Graph Search

Getting What You Measure

Chipping Away at Moore's Law

Non-obvious remote work techniques

Sir, Please Step Away from the ASR-33 (2010)

A Generation Lost in the Bazaar