Narrow your search

Library

FARO (2)

KU Leuven (2)

LUCA School of Arts (2)

Odisee (2)

Thomas More Kempen (2)

Thomas More Mechelen (2)

UCLL (2)

VIVES (2)

Vlaams Parlement (2)

Vlerick Business School (1)


Resource type

book (2)


Language

English (1)

German (1)


Year
From To Submit

2022 (2)

Listing 1 - 2 of 2
Sort by

Book
Technological Surveillance of Communication in American, German and Chinese Criminal Procedure..
Author:
Year: 2022 Publisher: Berlin : Duncker & Humblot,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Due to the rise of organized crime and the rapid development of surveillance technologies, such technologies are increasingly used for the purpose of criminal investigation. However, the proliferation of such highly intrusive measures can jeopardize the individual right to privacy and the constitutionally protected secrecy of private telecommunication. It is therefore necessary to devise a legal framework that balances the need for efficient law enforcement with individuals' privacy rights. In this study, the author discusses the laws on covert surveillance as an investigative measure in the criminal process of the United States, Germany, and the P.R. China from theoretical and empirical perspectives. The author then provides a horizontal comparison of the three legal systems, with the aim of identifying solutions that achieve a proper balance between the protection of the right to privacy and the effective combat of crime.Due to the rise of organized crime and the rapid development of surveillance technologies, such technologies are increasingly used for the purpose of criminal investigation. However, the proliferation of such highly intrusive measures can jeopardize the individual right to privacy and the constitutionally protected secrecy of private telecommunication. It is therefore necessary to devise a legal framework that balances the need for efficient law enforcement with individuals' privacy rights. In this study, the author discusses the laws on covert surveillance as an investigative measure in the criminal process of the United States, Germany, and the P.R. China from theoretical and empirical perspectives. The author then provides a horizontal comparison of the three legal systems, with the aim of identifying solutions that achieve a proper balance between the protection of the right to privacy and the effective combat of crime.


Book
Physical-Layer Security, Quantum Key Distribution and Post-quantum Cryptography
Author:
Year: 2022 Publisher: Basel MDPI Books

Loading...
Export citation

Choose an application

Bookmark

Abstract

The growth of data-driven technologies, 5G, and the Internet place enormous pressure on underlying information infrastructure. There exist numerous proposals on how to deal with the possible capacity crunch. However, the security of both optical and wireless networks lags behind reliable and spectrally efficient transmission. Significant achievements have been made recently in the quantum computing arena. Because most conventional cryptography systems rely on computational security, which guarantees the security against an efficient eavesdropper for a limited time, with the advancement in quantum computing this security can be compromised. To solve these problems, various schemes providing perfect/unconditional security have been proposed including physical-layer security (PLS), quantum key distribution (QKD), and post-quantum cryptography. Unfortunately, it is still not clear how to integrate those different proposals with higher level cryptography schemes. So the purpose of the Special Issue entitled “Physical-Layer Security, Quantum Key Distribution and Post-quantum Cryptography” was to integrate these various approaches and enable the next generation of cryptography systems whose security cannot be broken by quantum computers. This book represents the reprint of the papers accepted for publication in the Special Issue.

Listing 1 - 2 of 2
Sort by