Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection
This volume contains the proceedings of ASIACRYPT '91, the first international conference on the theory and application of cryptology to be held in the Asian area. It was held at Fujiyoshida, near Mount Fuji in Japan, in November 1991. The conference was modeled after the very successful CRYTO and EUROCRYPT series of conferences sponsored by the International Association for Cryptologic Research (IACR). The IACR and the Institute of Electronics, Information and Communication Engineers were sponsors for ASIACRYPT '91. The papers from the conference were improved and corrected for inclusion in this volume. The papers are grouped into parts on: differential cryptanalysis and DES-like cryptosystems; hashing and signature schemes; secret sharing, threshold, and authenticationcodes; block ciphers - foundations and analysis; cryptanalysis and new ciphers; proof systems and interactive protocols; public key ciphers - foundations and analysis. Also included are four invited lectures and impromptu talks from the rump session.
The language of business and management, and of infor mation technology, is being employed across all sectors of economic and social activity. In recent years computers and information technology (IT) in general have moved from being a scarce resource to being a more generally available commodity, without a corresponding increase in understanding of how the new generation of tools can be used. IT is available on individual desktops, supporting decision making and communication, but often conven tional organizations have failed to adapt, individuals lack competence and confidence, and senior managers lack both the strategic insight to develop appropriate strategies and the humility to accept that they need to learn. As each sector, whether business, education, public sec tor management or the community and voluntary sector, realizes that the potential of IT is not being exploited to the full, calls are issued for the development of new "hybrid managers," a term coined to describe the gap in understanding and competence that is to be filled. The two editors work in the hybrid field of business information technology, which is a melting pot of ideas and experience from numerous traditional disciplines. The pace of change is such that no one individual could ever be abreast of all technical and business develop ments, but the field is now sufficiently mature for us to identify certain underlying issues and principles, and areas of research for the coming years."
This book contains the proceedings of AUSCRYPT '92, an international conference on cryptologic research held on the Gold Coast, Australia, in December 1992. This is the third conference held outside the series of CRYPTO meetings held in Santa Barbara, California, each August and EUROCRYPT meetings held in European countries each northern spring. The first two were AUSCRYPT '90, held in Australia, and ASIACRYPT '91, held in Japan. The volume contains three invited papers and 44 contributed papers selected from 77 submissions. The articles cover all main topics in modern computer and communications security research.These include: - authentication - secret sharing - digital signatures - one-way hashing functions - design of block ciphers - cryptanalysis - cryptographic protocols - pseudo-random sequences and functions - public key cryptography.
Crypto '90 marked the tenth anniversary of the Crypto conferences held at the University of California at Santa Barbara. The conference was held from August 11 to August 15, 1990 and was sponsored by the International Association for Cryptologic Research, in cooperation with the IEEE Computer Society Technical Committee on Security and Privacy and the Department of Computer Science of the University of California at Santa Barbara. 227 participants from twenty countries around the world. Crypto '90 attracted Roughly 35% of attendees were from academia, 45% from industry and 20% from government. The program was intended to provide a balance between the purely theoretical and the purely practical aspects of cryptography to meet the needs and diversified interests of these various groups. The overall organization of the conference was superbly handled by the general chairperson Sherry McMahan. All of the outstanding features of Crypto, which we have come to expect over the years, were again present and, in addition to all of this, she did a magnificent job in the preparation of the book of abstracts. This is a crucial part of the program and we owe her a great deal of thanks.
Secure message transmission is of extreme importance in today's information-based society. Stream encryption is a practically important means to this end. This monograph is devoted to a new aspect of stream ciphers, namely the stability theory of stream ciphers, with the purpose of developing bounds on complexity which can form part of the basis for a general theory of data security and of stabilizing stream-cipher systems. The approach adopted in this monograph is new. The topic is treated by introducing measure indexes on the security of stream ciphers, developing lower bounds on these indexes, and establishing connections among them. The treatment involves the stability of boolean functions, the stability of linear complexity of key streams, the period stability of key streams, and the stability of source codes. Misleading ideas about stream ciphers are exposed and new viewpoints presented. The numerous measure indexes and bounds on them that are introduced here, the approach based on spectrum techniques, andthe ten open problems presented will all be useful to the reader concerned with analyzing and designing stream ciphers for securing data.
This open access book provides researchers and professionals with a foundational understanding of online privacy as well as insight into the socio-technical privacy issues that are most pertinent to modern information systems, covering several modern topics (e.g., privacy in social media, IoT) and underexplored areas (e.g., privacy accessibility, privacy for vulnerable populations, cross-cultural privacy). The book is structured in four parts, which follow after an introduction to privacy on both a technical and social level: Privacy Theory and Methods covers a range of theoretical lenses through which one can view the concept of privacy. The chapters in this part relate to modern privacy phenomena, thus emphasizing its relevance to our digital, networked lives. Next, Domains covers a number of areas in which privacy concerns and implications are particularly salient, including among others social media, healthcare, smart cities, wearable IT, and trackers. The Audiences section then highlights audiences that have traditionally been ignored when creating privacy-preserving experiences: people from other (non-Western) cultures, people with accessibility needs, adolescents, and people who are underrepresented in terms of their race, class, gender or sexual identity, religion or some combination. Finally, the chapters in Moving Forward outline approaches to privacy that move beyond one-size-fits-all solutions, explore ethical considerations, and describe the regulatory landscape that governs privacy through laws and policies. Perhaps even more so than the other chapters in this book, these chapters are forward-looking by using current personalized, ethical and legal approaches as a starting point for re-conceptualizations of privacy to serve the modern technological landscape. The book's primary goal is to inform IT students, researchers, and professionals about both the fundamentals of online privacy and the issues that are most pertinent to modern information systems. Lecturers or teachers can assign (parts of) the book for a "professional issues" course. IT professionals may select chapters covering domains and audiences relevant to their field of work, as well as the Moving Forward chapters that cover ethical and legal aspects. Academics who are interested in studying privacy or privacy-related topics will find a broad introduction in both technical and social aspects.
The EU's General Data Protection Regulation created the position of corporate Data Protection Officer (DPO), who is empowered to ensure the organization is compliant with all aspects of the new data protection regime. Organizations must now appoint and designate a DPO. The specific definitions and building blocks of the data protection regime are enhanced by the new General Data Protection Regulation and therefore the DPO will be very active in passing the message and requirements of the new data protection regime throughout the organization. This book explains the roles and responsiblies of the DPO, as well as highlights the potential cost of getting data protection wrong.
Most of the devices in the Internet of Things will be battery powered sensor devices. All the operations done on battery powered devices require minimum computation. Secure algorithms like RSA become useless in the Internet of Things environment. Elliptic curve based cryptography emerges as a best solution for this problem because it provides higher security in smaller key size compare to RSA. This book focuses on the use of Elliptic Curve Cryptography with different authentication architectures and authentication schemes using various security algorithms. It also includes a review of the math required for security and understanding Elliptic Curve Cryptography.
It is our pleasure to thank dl those uho contributed to nial\ing thew proceeding\ possible: the authors. progriimme committee. organihing committee, I4C.K otticfrh and directors, and all the attendees. We were all deeplq saddened nhen ne lemied th,it Tore Ilerle~tam. J member 01 the programme committee, had died unexpsctedl\ Thi\ olunie I\ dedicated to liim Amsterdum, the Netherlirnds London, Englund Junuur,, 1988 __~ ...~~~. ~ ~ ~ I. Advances in C'r>ptolog?: .A Report on C'RY t'TO Si. Allen Cirr\lio. k.d. L 04. Department of P.lectrica1 and ('omputcr Engineering, S'iiita Harhara 2. C'ryptography: Proceeding\. Burg keusrwiii lYX2 (I.ecturr biotr5 in C'omptitcr Scicncr: 149). I li- mas Beth, Ed. Springer-Verlag. 1983. 3. Advanccs in C'rytology: Proceedings cif C'KY'PTO S2, I),]\ id ('hauin. Ronald L KiLcsi. and Al~n I Sherman. Eds. Plenum NY. 1YX3. 4. Advances in C'ryptology: Proceeding5 of C'K)'f)l.O S3. D;i\id ('hiiuni, kd. I'Icnuiii XY. IY84. IV ~~~ ~ ~~~_.______ 5 4dbances in Crqptolog>: Proceeding, of C'RYP'TO X4 (Lecture Notes in Computer Science: 196). G.R. Blakley and Ua\ id ('haurn. Eda. Springer-Verlag, 19x5. 6. .Advances in CTptology: Proceeding\ of C'RYPTO X5 (Lecture Notes in C'oiiiputer Sc~encc: 2 IX). tlugh C. Williams. Ed. Springer-Vrrl:ig. 1986. 7. Advances in Cqptologq : Proceedings of C'RYP10 80 (Lecture h'cite\ in C'ornputer Scwncc: 263). A.hl Odlyzko. td. Springer-Verlag. 1987. 8. No proceedings were published for ECROCRYP7 X3. which w:i\ held in Udiiie Ital?.
The storage, routing and transmission of information, either in the form of digital data or of analog signals, plays a central role in modern society. To ensure that such information is protected from access by unauthorized persons is an important new challenge. The development of the theory and practical techniques needed to meet this challenge is the goal of current cryptological research. This research is highly varied and multidisciplinary. It is concerned with fundamental problems in mathematics and theoretical computer science as well as with the engineering aspects of complex information systems. Cryptology today ranks among the most active and interesting areas of research in both science and engineering. EUROCRYPT '85 maintained the tradition of the three previous workshops in this series (Paris 1984, Udine 1983, Burg Feuerstein 1982) with its emphasis on recent developments in cryptology, but also made a concerted effort to encompass more traditional topics in cryptology such as shift register theory and system theory. The many papers on these topics in this volume are witness to the success of this effort.
A collection of best practices and effective implementation recommendations that are proven to work, Secure, Resilient, and Agile Software Development leaves the boring details of software security theory out of the discussion as much as possible to concentrate on practical applied software security for practical people. Written to aid your career as well as your organization, the book shows how to gain skills in secure and resilient software development and related tasks. The book explains how to integrate these development skills into your daily duties, thereby increasing your professional value to your company, your management, your community, and your industry. Secure, Resilient, and Agile Software Development was written for the following professionals: AppSec architects and program managers in information security organizations Enterprise architecture teams with application development focus Scrum teams DevOps teams Product owners and their managers Project managers Application security auditors With a detailed look at Agile and Scrum software development methodologies, this book explains how security controls need to change in light of an entirely new paradigm on how software is developed. It focuses on ways to educate everyone who has a hand in any software development project with appropriate and practical skills to Build Security In. After covering foundational and fundamental principles for secure application design, this book dives into concepts, techniques, and design goals to meet well-understood acceptance criteria on features an application must implement. It also explains how the design sprint is adapted for proper consideration of security as well as defensive programming techniques. The book concludes with a look at white box application analysis and sprint-based activities to improve the security and quality of software under development.
Discusses the evolution of WHOIS and how policy changes will affect WHOIS place in IT today and in the future This book provides a comprehensive overview of WHOIS. The text begins with an introduction to WHOIS and an in-depth coverage of its forty-year history. Afterwards it examines how to use WHOIS and how WHOIS fits in the overall structure of the Domain Name System (DNS). Other technical topics covered include WHOIS query code and WHOIS server details. The book also discusses current policy developments and implementations, reviews critical policy documents, and explains how they will affect the future of the Internet and WHOIS. Additional resources and content updates will be provided through a supplementary website. * Includes an appendix with information on current and authoritative WHOIS services around the world * Provides illustrations of actual WHOIS records and screenshots of web-based WHOIS query interfaces with instructions for navigating them * Explains network dependencies and processes related to WHOIS utilizing flowcharts * Contains advanced coding for programmers * Visit the book's companion website http://whois.knujon.com for technical and policy documents concerning WHOIS, WHOIS code examples, internet locations for WHOIS databases and more. WHOIS Running the Internet: Protocol, Policy, and Privacy is written primarily for internet developers, policy developers, industry professionals in law enforcement, digital forensic investigators, and intellectual property attorneys. Garth O. Bruen is an Internet policy and security researcher whose work has been published in the Wall Street Journal and the Washington Post. Since 2012 Garth Bruen has served as the North American At-Large Chair to the Internet Corporation of Assigned Names and Numbers (ICANN). In 2003 Bruen created KnujOn.com with his late father, Dr. Robert Bruen, to process and investigate Internet abuse complaints (SPAM) from consumers. Bruen has trained and advised law enforcement at the federal and local levels on malicious use of the Domain Name System in the way it relates to the WHOIS record system. He has presented multiple times to the High Technology Crime Investigation Association (HTCIA) as well as other cybercrime venues including the Anti-Phishing Working Group (APWG) and the National Center for Justice and the Rule of Law at The University of Mississippi School of Law. Bruen also teaches the Fisher College Criminal Justice School in Boston where he develops new approaches to digital crime.
If you are curious about the basics of artificial intelligence, blockchain technology, and quantum computing as key enablers for digital transformation and innovation, Digital Fluency is your handy guide. The real-world applications of these cutting-edge technologies are expanding rapidly, and your daily life will continue to be affected by each of them. There is no better time than now to get started and become digitally fluent. You need not have previous knowledge of these versatile technologies, as author Volker Lang will expertly guide you through this digital age. He illustrates key concepts and applications in numerous practical examples and more than 48 catchy figures throughout Digital Fluency. The end of each chapter presents you with a helpful implementation checklist of central lessons before proceeding to the next. This book gets to the heart of digital buzzwords and concepts, and tells you what they truly mean. Breaking down topics such as automated driving and intelligent robotics powered by artificial intelligence, blockchain-based cryptocurrencies and smart contracts, drug development and optimization of financial investment portfolios by quantum computing, and more is imperative to being ready for what the future of industry holds. Whether your own digital transformation journey takes place within your private or public organization, your studies, or your individual household, Digital Fluency maps out a concrete digital action plan for all of your technology and innovation strategy needs. What You Will Learn Gain guidance in the digital age without requiring any previous knowledge about digital technologies and digital transformation Get acquainted with the most popular current and prospective applications of artificial intelligence, blockchain technology, and quantum computing across a wide range of industries including healthcare, financial services, and the automobile industry Become familiar with the digital innovation models of Amazon, Google, Microsoft, IBM, and other world-leading organizations Implement your own digital transformation successfully along the eight core dimensions of a concrete digital action plan Who This Book Is ForThought-leaders, business executives and industry strategists, management and strategy consultants, politicians and policy makers, entrepreneurs, financial analysts, investors and venture capitalists, students and research scientists, as well as general readers, who want to become digitally fluent.
We live our lives online - banking, shopping, working, dating - but have we become complacent? Who's got your money? We share our personal details, our thoughts and movements with a faceless screen, with no real idea what lies behind it. Who's got your identity? DarkMarket exposes the shocking truth about what lurks behind our computers: an underground crime network that invades our privacy and threatens our security on a daily basis. Who's got your life? Glenny tracks down the key players - including criminals, national and international security experts, police, crack addicts, the Saudi Royal Family, and most importantly, victims - to reveal the true scale of this new global threat. Shortlisted for the Orwell Prize 2012
Web Privacy with P3P explains the P3P protocol and shows web site developers how to configure their sites for P3P compliance. Full of examples and case studies, the book delivers practical advice and insider tips. Software developers, privacy consultants, corporate decision-makers, lawyers, public policy-makers, and any individual interested in online privacy issues will find this book a necessary reference.
Statistical data and evidence-based claims are increasingly central to our everyday lives. Critically examining 'Big Data', this book charts the recent explosion in sources of data, including those precipitated by global developments and technological change. It sets out changes and controversies related to data harvesting and construction, dissemination and data analytics by a range of private, governmental and social organisations in multiple settings. Analysing the power of data to shape political debate, the presentation of ideas to us by the media, and issues surrounding data ownership and access, the authors suggest how data can be used to uncover injustices and to advance social progress.
This popular text introduces the reader to all aspects of psychometric assessment, including its history, the construction and administration of traditional tests, and the latest techniques for psychometric assessment online. Rust, Kosinski, and Stillwell begin with a comprehensive introduction to the increased sophistication in psychometric methods and regulation that took place during the 20th century, including the many benefits to governments, businesses, and customers. In this new edition, the authors explore the increasing influence of the internet, wherein everything we do on the internet is available for psychometric analysis, often by AI systems operating at scale and in real time. The intended and unintended consequences of this paradigm shift are examined in detail, and key controversies, such as privacy and the psychographic microtargeting of online messages, are addressed. Furthermore, this new edition includes brand-new chapters on item response theory, computer adaptive testing, and the psychometric analysis of the digital traces we all leave online. Modern Psychometrics combines an up-to-date scientific approach with full consideration of the political and ethical issues involved in the implementation of psychometric testing in today's society. It will be invaluable to both undergraduate and postgraduate students, as well as practitioners who are seeking an introduction to modern psychometric methods.
This popular text introduces the reader to all aspects of psychometric assessment, including its history, the construction and administration of traditional tests, and the latest techniques for psychometric assessment online. Rust, Kosinski, and Stillwell begin with a comprehensive introduction to the increased sophistication in psychometric methods and regulation that took place during the 20th century, including the many benefits to governments, businesses, and customers. In this new edition, the authors explore the increasing influence of the internet, wherein everything we do on the internet is available for psychometric analysis, often by AI systems operating at scale and in real time. The intended and unintended consequences of this paradigm shift are examined in detail, and key controversies, such as privacy and the psychographic microtargeting of online messages, are addressed. Furthermore, this new edition includes brand-new chapters on item response theory, computer adaptive testing, and the psychometric analysis of the digital traces we all leave online. Modern Psychometrics combines an up-to-date scientific approach with full consideration of the political and ethical issues involved in the implementation of psychometric testing in today's society. It will be invaluable to both undergraduate and postgraduate students, as well as practitioners who are seeking an introduction to modern psychometric methods.
Statistical data and evidence-based claims are increasingly central to our everyday lives. Critically examining 'Big Data', this book charts the recent explosion in sources of data, including those precipitated by global developments and technological change. It sets out changes and controversies related to data harvesting and construction, dissemination and data analytics by a range of private, governmental and social organisations in multiple settings. Analysing the power of data to shape political debate, the presentation of ideas to us by the media, and issues surrounding data ownership and access, the authors suggest how data can be used to uncover injustices and to advance social progress.
The software industry continues to expand as new products enter into the technological marketplace in order to meet increasing demand. As a result of the popularity of often-expensive software products, companies face the growing challenge of protecting their products against copyright infringement. Judiciary-Friendly Forensics of Software Copyright Infringement discusses the forensics of software copyright infringement. This book highlights theoretical, functional, and procedural matters in the investigation of copyright infringement of software products, as well as the development of forensic technologies to detect and eliminate software piracy. As this publication will explore comprehensive topics on the forensic process of software piracy, it is an essential resource for software forensic experts, lawyers in the field of copyright infringement, judges, software professionals, software developers, and students.
This book contains selected papers presented at the 13th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held in Vienna, Austria, in August 2018. The 10 full papers included in this volume were carefully reviewed and selected from 27 submissions. Also included are reviewed papers summarizing the results of workshops and tutorials that were held at the Summer School as well as papers contributed by several of the invited speakers. The papers combine interdisciplinary approaches to bring together a host of perspectives: technical, legal, regulatory, socio-economic, social, societal, political, ethical, anthropological, philosophical, historical, and psychological.
This book aims to sort out the clear logic of the development of machine learning-driven privacy preservation in IoTs, including the advantages and disadvantages, as well as the future directions in this under-explored domain. In big data era, an increasingly massive volume of data is generated and transmitted in Internet of Things (IoTs), which poses great threats to privacy protection. Motivated by this, an emerging research topic, machine learning-driven privacy preservation, is fast booming to address various and diverse demands of IoTs. However, there is no existing literature discussion on this topic in a systematically manner. The issues of existing privacy protection methods (differential privacy, clustering, anonymity, etc.) for IoTs, such as low data utility, high communication overload, and unbalanced trade-off, are identified to the necessity of machine learning-driven privacy preservation. Besides, the leading and emerging attacks pose further threats to privacy protection in this scenario. To mitigate the negative impact, machine learning-driven privacy preservation methods for IoTs are discussed in detail on both the advantages and flaws, which is followed by potentially promising research directions. Readers may trace timely contributions on machine learning-driven privacy preservation in IoTs. The advances cover different applications, such as cyber-physical systems, fog computing, and location-based services. This book will be of interest to forthcoming scientists, policymakers, researchers, and postgraduates. |
You may like...
EU General Data Protection Regulation…
It Governance Privacy Team
Paperback
R738
Discovery Miles 7 380
Handbook of Research on Advanced…
Ahmed J. Obaid, Ghassan H Abdul-Majeed, …
Hardcover
R7,692
Discovery Miles 76 920
Cyber Security and Threats - Concepts…
Information Reso Management Association
Hardcover
R9,960
Discovery Miles 99 600
Pegasus - The Story Of The World's Most…
Laurent Richard, Sandrine Rigaud
Paperback
Cyber Security and Threats - Concepts…
Information Reso Management Association
Hardcover
R9,960
Discovery Miles 99 600
Smart-Tech Society - Convenience…
Mark Whitehead, William G.A. Collier
Hardcover
R2,732
Discovery Miles 27 320
|