e-Key: Security Infrastructure

image-20170321-5405-mcf0su.jpg

A new piece from The Conversation about security infrastructure investigating security options, including going back to the physical key as an alternative to password overload in online platforms.

The age of hacking brings a return to the physical keyby Jungwoo Ryoo, Pennsylvania State University