Listing 1 - 10 of 24 | << page >> |
Sort by
|
Choose an application
Michael Richardson argues that a radical rethinking of what counts as witnessing is central to building a framework for justice, suggesting that nonhuman witnessing is central to combat contemporary global crises.
Choose an application
Privacy-preserving computing aims to protect the personal information of users while capitalizing on the possibilities unlocked by big data. This practical introduction for students, researchers, and industry practitioners is the first cohesive and systematic presentation of the field's advances over four decades. The book shows how to use privacy-preserving computing in real-world problems in data analytics and AI, and includes applications in statistics, database queries, and machine learning. The book begins by introducing cryptographic techniques such as secret sharing, homomorphic encryption, and oblivious transfer, and then broadens its focus to more widely applicable techniques such as differential privacy, trusted execution environment, and federated learning. The book ends with privacy-preserving computing in practice in areas like finance, online advertising, and healthcare, and finally offers a vision for the future of the field.
Privacy-preserving techniques (Computer science) --- Computer security. --- Data privacy. --- Artificial intelligence. --- Information technology --- Privacy, Right of. --- Big data. --- Security measures.
Choose an application
This book provides readers with the basic understanding regarding the threats to the voice processing systems, the state-of-the-art defense methods as well as the current research results on securing voice processing systems. It also introduces three mechanisms to secure the voice processing systems against malicious voice attacks under different scenarios, by utilizing time-domain signal waves, frequency-domain spectrum features and acoustic physical attributes. First, the authors uncover the modulated replay attack, which uses an inverse filter to compensate for the spectrum distortion caused by the replay attacks to bypass the existing spectrum-based defenses. The authors also provide an effective defense method that utilizes both the time-domain artifacts and frequency-domain distortion to detect the modulated replay attacks. Second, the book introduces a secure automatic speech recognition system for driverless car to defeat adversarial voice command attacks launched from car loudspeakers, smartphones and passengers. Third, it provides an acoustic compensation system design to reduce the effects from the spectrum reduction attacks, by the audio spectrum compensation and acoustic propagation principle. Finally, the authors conclude with their research effort on defeating the malicious voice attacks and provide insights into more secure voice processing systems. This book is intended for security researchers, computer scientists and electrical engineers who are interested in the research areas of biometrics, speech signal processing, IoT security and audio security. Advanced-level students who are studying these topics will benefit from this book as well.
Data protection --- Biometric identification. --- Privacy. --- Biometrics. --- Law and legislation.
Choose an application
Computer. Automation --- cybercultuur --- digitale oorlog --- internet --- maatschappijkritiek --- privacy --- computercriminaliteit
Choose an application
This CCIS post conference volume constitutes the proceedings of First Workshop, SUNRISE 2023, in Stavanger, Norway, in November 2023. The 4 full papers together in this volume were carefully reviewed and selected from 9 submissions. The workshop offers a wide range of techniques addressing cybersecurity skills, access control, privacy risks, and resilience in healthcare systems.
Artificial intelligence. --- Data protection --- Artificial Intelligence. --- Privacy. --- Law and legislation.
Choose an application
European law --- Human rights --- Information systems --- privacy --- gegevensverwerking --- Belgium
Choose an application
Our privacy is besieged by tech companies. Companies can do this because our laws are built on outdated ideas that trap lawmakers, regulators, and courts into wrong assumptions about privacy, resulting in ineffective legal remedies to one of the most pressing concerns of our generation. Drawing on behavioral science, sociology, and economics, Ignacio Cofone challenges existing laws and reform proposals and dispels enduring misconceptions about data-driven interactions. This exploration offers readers a holistic view of why current laws and regulations fail to protect us against corporate digital harms, particularly those created by AI. Cofone then proposes a better response: meaningful accountability for the consequences of corporate data practices, which ultimately entails creating a new type of liability that recognizes the value of privacy.
Privacy, Right of. --- Data protection --- Privacy, Right of --- Tort liability of corporations. --- Law and legislation. --- Economic aspects.
Choose an application
This book offers an overview of the field of continuous biometric authentication systems, which capture and continuously authenticate biometrics from user devices. This book first covers the traditional methods of user authentication and discusses how such techniques have become cumbersome in the world of mobile devices and short usage sessions. The concept of continuous biometric authentication systems is introduced and their construction is discussed. The different biometrics that these systems may utilise (e.g.: touchscreen-gesture interactions) are described and relevant studies surveyed. It also surveys important considerations and challenges. This book brings together a wide variety of key motivations, components and advantages of continuous biometric authentication systems. The overview is kept high level, so as not to limit the scope to any single device, biometric trait, use-case, or scenario. Therefore, the contents of this book are applicable to devices ranging from smartphones to desktop computers, utilising biometrics ranging from face recognition to keystroke dynamics. It also provides metrics from a variety of existing systems such that users can identify the advantages and disadvantages of different approaches. This book targets researchers and lecturers working in authentication, as well as advanced-level students in computer science interested in this field. The book will also be of interest to technical professionals working in cyber security.
Biometric identification. --- Pattern recognition systems. --- Data protection --- Biometrics. --- Automated Pattern Recognition. --- Privacy. --- Law and legislation.
Choose an application
Grand, extravagant, magnificent, scandalous, corrupt, political, personal, fractious; these are terms often associated with the medieval and early modern courts. Moreover, the court constituted a forceful nexus in the social world, which was central to the legitimacy and authority of rulership. As such, courts shaped European politics and culture: architecture, art, fashion, patronage, and cultural exchanges were integral to the spectacle of European courts. Researchers have convincingly emphasised the public nature of courtly events, procedures, and ceremonies. Nevertheless, court life also involved pockets of privacy, which have yet to be systematically addressed. This edited collection addresses this lacuna and offers interpretations that urge us to reassesses the public nature of European courts. Thus, the proposed publication will fertilise the grounds for a discussion of the past and future of court studies. Indeed, the contributions make us reconsider present-day understandings of privacy as a stable and uncontestable notion.
Choose an application
Cybersecurity is a necessity in the modern world, where computers and other electronic devices communicate via networks, and breakdowns in cybersecurity cost society many resources. The aims of cybersecurity are quite simple: data must not be read, modified, deleted or made unavailable by persons who are not allowed to. To meet this major challenge successfully in the digitally interconnected world, one needs to master numerous disciplines because modern IT systems contain software, cryptographic modules, computing units, networks, and human users—all of which can influence the success or failure in the effort. Topics and features: Introduces readers to the main components of a modern IT system: basic hardware, networks, operating system, and network-based applications Contains numerous theoretical and practical exercises to illustrate important topics Discusses protective mechanisms commonly used to ensure cybersecurity and how effective they are Discusses the use of cryptography for achieving security in IT systems Explains how to plan for protecting IT systems based on analysing the risk of various forms of failure Illustrates how human users may affect system security and ways of improving their behaviour Discusses what to do if a security failure takes place Presents important legal concepts relevant for cybersecurity, including the concept of cybercrime This accessible, clear textbook is intended especially for students starting a relevant course in computer science or engineering, as well as for professionals looking for a general introduction to the topic. Dr. Robin Sharp is an emeritus professor in the Cybersecurity Section at DTU Compute, the Dept. of Applied Mathematics and Computer Science at the Technical University of Denmark (DTU).
Cryptography. --- Data encryption (Computer science). --- Data protection. --- Data protection --- Cryptology. --- Data and Information Security. --- Privacy. --- Law and legislation. --- Computer. Automation
Listing 1 - 10 of 24 | << page >> |
Sort by
|