Search Results - "Privacy"
Suggested Topics within your search.
Suggested Topics within your search.
- Computer security 41
- Media studies 39
- Artificial intelligence 31
- Technology: general issues 31
- Computer science 29
- Law 28
- Privacy & data protection 26
- Data protection 25
- Computer networking & communications 24
- History of engineering & technology 24
- Data and Information Security 19
- Communications engineering / telecommunications 17
- Entertainment & media law 17
- Ethics & moral philosophy 17
- Business mathematics & systems 15
- Data mining 15
- Information technology: general issues 15
- Information technology 14
- Law and legislation 14
- Politics & government 14
- Software Engineering 14
- Crime & criminology 13
- Impact of science & technology on society 13
- Communication studies 12
- Network hardware 12
- Network security 12
- Psychology 12
- Artificial Intelligence 11
- IT & Communications law 11
- International law 11
-
761
-
762
-
763
-
764
The State of Open Data Histories and Horizons
Published 2019OAPEN Library: download the publication
OAPEN Library: description of the publication
Electronic Book Chapter -
765
-
766
-
767
-
768
-
769
-
770
Security of Ubiquitous Computing Systems Selected Topics /
Published 2021Table of Contents: “…Part I: Introduction -- Emerging Security Challenges for Ubiquitous Devices -- Part II: Lightweight Cryptographic Primitives -- Catalog and Illustrative Examples of Lightweight Cryptographic Primitives -- Selected Design and Analysis Techniques in Contemporary Symmetric Encryption -- An Account of the ISO/IEC Standardization of the Simon and Speck Block Cipher Families -- Part III: Authentication Protocols -- ePassport and eID Technologies -- Ultra-lightweight Authentication -- From Relay Attacks to Distance-Bounding Protocols -- Part IV: Hardware Implementation and Systems -- It Started With Templates: The Future of Profiling in Side-Channel Analysis -- Side Channel Attack Assessment Platforms and Tools for Ubiquitous Systems -- Challenges in Certifying Small-scale (IoT) Hardware Random Number Generators -- Finding Software Bugs in Embedded Devices -- Part V: Privacy and Forensics -- Privacy-Oriented Analysis of Ubiquitous Computing Systems: A 5-D Approach -- IoT Forensics.…”
Link to Metadata
Electronic eBook -
771
Digital Citizenship in Africa Technologies of Agency and Repression
Published 2023DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
772
Managing Risk and Information Security: Protect to Enable (Second Edition)
Published 2016DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
773
Human Rights in the Age of Platforms
Published 2019DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
774
The Good Drone How Social Movements Democratize Surveillance
Published 2020DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
775
Discourse and Identity on Facebook
Published 2017DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
776
Ethical Considerations of Using ChatGPT in Health Care
Published 2023Connect to this object online.
Book -
777
-
778
-
779
-
780