Listing 1 - 10 of 10 |
Sort by
|
Choose an application
Why we can't resist listening in on our neighboursEavesdropping has a bad name. It is a form of human communication in which the information gained is stolen, and where such words as cheating and spying come into play. But eavesdropping may also be an attempt to understand what goes on in the lives of others so as to know better how to live one's own. John Locke's entertaining and disturbing account explores everything from sixteenth-century voyeurism to Hitchcock's 'Rear Window'; from chimpanzee behaviour to Parisian caf--eacute--; society; fromprivate eyes to Facebook and Twitter. He uncover
Choose an application
Wiretapping --- Eavesdropping --- United States.
Choose an application
Choose an application
Intelligence service --- National security --- Eavesdropping --- Wiretapping --- Law and legislation
Choose an application
Intelligence service --- National security --- Eavesdropping --- Wiretapping --- Law and legislation
Choose an application
Due to the rise of organized crime and the rapid development of surveillance technologies, such technologies are increasingly used for the purpose of criminal investigation. However, the proliferation of such highly intrusive measures can jeopardize the individual right to privacy and the constitutionally protected secrecy of private telecommunication. It is therefore necessary to devise a legal framework that balances the need for efficient law enforcement with individuals' privacy rights. In this study, the author discusses the laws on covert surveillance as an investigative measure in the criminal process of the United States, Germany, and the P.R. China from theoretical and empirical perspectives. The author then provides a horizontal comparison of the three legal systems, with the aim of identifying solutions that achieve a proper balance between the protection of the right to privacy and the effective combat of crime.Due to the rise of organized crime and the rapid development of surveillance technologies, such technologies are increasingly used for the purpose of criminal investigation. However, the proliferation of such highly intrusive measures can jeopardize the individual right to privacy and the constitutionally protected secrecy of private telecommunication. It is therefore necessary to devise a legal framework that balances the need for efficient law enforcement with individuals' privacy rights. In this study, the author discusses the laws on covert surveillance as an investigative measure in the criminal process of the United States, Germany, and the P.R. China from theoretical and empirical perspectives. The author then provides a horizontal comparison of the three legal systems, with the aim of identifying solutions that achieve a proper balance between the protection of the right to privacy and the effective combat of crime.
Electronic surveillance --- Wiretapping --- Eavesdropping --- Criminal law. --- Law and legislation.
Choose an application
Electronic surveillance --- Eavesdropping --- Wiretapping --- Civil rights --- Privacy, Right of --- Information technology
Choose an application
This book tells the story of government-sponsored wiretapping in Britain and the United States from the rise of telephony in the 1870s until the terrorist attacks of 9/11. It pays particular attention to the 1990s, which marked one of the most dramatic turns in the history of telecommunications interception. During that time, fiber optic and satellite networks rapidly replaced the copper-based analogue telephone system that had remained virtually unchanged since the 1870s. That remarkable technological advance facilitated the rise of the networked home computer, cellular telephony, and the Internet, and users hailed the dawn of the digital information age. However, security agencies such as the FBI and MI5 were concerned. Since the emergence of telegraphy in the 1830s, security services could intercept private messages using wiretaps, and this was facilitated by some of the world's largest telecommunications monopolies such as AT&T in the US and British Telecom in the UK. The new, digital networks were incompatible with traditional wiretap technology. To make things more complicated for the security services, these monopolies had been privatized and broken up into smaller companies during the 1980s, and in the new deregulated landscape the agencies had to seek assistance from thousands of startup companies that were often unwilling to help. So for the first time in history, technological and institutional changes posed a threat to the security services’ wiretapping activities, and government officials in Washington and London acted quickly to protect their ability to spy, they sought to force the industry to change the very architecture of the digital telecommunications network. This book describes in detail the tense negotiations between governments, the telecommunications industry, and civil liberties groups during an unprecedented moment in history when the above security agencies were unable to wiretap. It reveals for the first time the thoughts of some of the protagonists in these crucial negotiations, and explains why their outcome may have forever altered the trajectory of our information society.
Computer security. --- Technology—History. --- Criminology. --- System safety. --- Systems and Data Security. --- History of Technology. --- Criminology and Criminal Justice, general. --- Security Science and Technology. --- Safety, System --- Safety of systems --- Systems safety --- Accidents --- Industrial safety --- Systems engineering --- Crime --- Social sciences --- Criminals --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Prevention --- Study and teaching --- Protection --- Security measures --- Wiretapping. --- Wire-tapping --- Eavesdropping --- Electronic security systems
Choose an application
Eavesdropping in the Novel from Austen to Proust investigates human curiosity and its representation in eavesdropping scenes in nineteenth-century English and French novels. Ann Gaylin argues that eavesdropping dramatizes a primal human urge to know and offers a paradigm of narrative transmission and reception of information among characters, narrators and readers. Gaylin sheds light on the social and psychological effects of the nineteenth-century rise of information technology and accelerated flow of information, as manifested in the anxieties about - and delight in - displays of private life and its secrets. Analysing eavesdropping in Austen, Balzac, Collins, Dickens and Proust, Gaylin demonstrates the flexibility of the scene to produce narrative complication or resolution; to foreground questions of gender and narrative agency; to place the debates of privacy and publicity within the literal and metaphoric spaces of the nineteenth-century novel. This 2003 study will be of interest to scholars of nineteenth-century English and European literature.
English fiction --- Eavesdropping in literature. --- Comparative literature --- French fiction --- History and criticism. --- English and French. --- French and English. --- Austen, Jane, --- Collins, Wilkie, --- Balzac, Honoré de, --- Proust, Marcel, --- de Balzac, Honoré --- de Balzac, H. --- Balzac, Honoré de --- Collins, William Wilkie, --- Collins, William Wilkie --- Kollinz, Uilki, --- Collins, W., --- Collins, W. Wilkie, --- Коллинз, Уилки, --- קולינס, וילקי, --- 柯林斯威尔基, --- Ao-ssu-ting, --- Ao-ssu-ting, Chien, --- Aosiding, --- Aosiding, Jian, --- Āsṭin̲, Jēn̲, --- Austenová, Jane, --- Osten, Dzheĭn, --- Ostin, Dzhein, --- Lady, --- Author of Sense and Sensibility, --- Остен, Джейн, --- Остен, Джейм, --- אוסטן, ג׳יין --- אוסטן, ג׳יין, --- أوستن، جين، --- Views on eavesdropping. --- Prust, Marselʹ, --- Proust, Valentin Louis Georges Eugène Marcel, --- Pʻŭrusŭtʻŭ, Marŭsel, --- Pʻu-lu-ssu-tʻe, --- Пруст, Марсель, --- פרוסט, מארסל --- פרוסט, מרסל --- ,פרוסט, מרסל --- بروست، مارسيل،, --- Criticism and interpretation. --- Ba'erzhake, --- Balzac, H. de --- Balzac, Honorato, --- Balzak, --- Balʹzak, Onore, --- Balzaḳ, Onoreh deh, --- Balzāk, Ūnūrīh dī, --- Banzăc, Hônôrê đơ, --- Baruzakku, --- de Balzac, Honorato, --- Jeune célibataire, --- Pa-erh-cha-kʻo, --- Бальзак, Оноре де, --- באלזאק, אנארע דע, --- באלזאק, אונורה דה, --- באלזאק, האָנאָרע דע, --- בלזק, אונורה דה, --- בלזק, הונורה דה-, --- דע־באלזאק, האָנאָרע, --- بالزاك، انوره دو --- バルザック, --- 巴爾札克, --- 巴爾扎克, --- R'Hoone, --- Saint-Aubin, Horace de, --- Cloteaux, Aurore --- Arts and Humanities --- Literature --- Proust, Marcel --- Balzac, Honore de,
Choose an application
The growth of data-driven technologies, 5G, and the Internet place enormous pressure on underlying information infrastructure. There exist numerous proposals on how to deal with the possible capacity crunch. However, the security of both optical and wireless networks lags behind reliable and spectrally efficient transmission. Significant achievements have been made recently in the quantum computing arena. Because most conventional cryptography systems rely on computational security, which guarantees the security against an efficient eavesdropper for a limited time, with the advancement in quantum computing this security can be compromised. To solve these problems, various schemes providing perfect/unconditional security have been proposed including physical-layer security (PLS), quantum key distribution (QKD), and post-quantum cryptography. Unfortunately, it is still not clear how to integrate those different proposals with higher level cryptography schemes. So the purpose of the Special Issue entitled “Physical-Layer Security, Quantum Key Distribution and Post-quantum Cryptography” was to integrate these various approaches and enable the next generation of cryptography systems whose security cannot be broken by quantum computers. This book represents the reprint of the papers accepted for publication in the Special Issue.
continuous-variable quantum key distribution --- measurement device independent --- zero-photon catalysis --- underwater channel --- quantum key distribution (QKD) --- discrete variable (DV)-QKD --- continuous variable (CV)-QKD --- postquantum cryptography (PQC) --- quantum communications networks (QCNs) --- quantum communications --- entanglement --- surface codes --- quantum cryptography --- quantum key distribution --- quantum network --- measurement-device-independent --- mean-king’s problem --- mean multi-kings’ problem --- information disturbance theorem --- QKD --- distillation --- amplification --- reconciliation --- quantum identity authentication --- private equality tests --- conclusive exclusion --- single-photon mode --- synchronization --- algorithm --- detection probability --- vulnerability --- twin-field quantum key distribution --- phase-matching --- discrete phase randomization --- intrinsic bit error rate --- the Bernstein-Vazirani algorithm --- EPR pairs --- quantum entanglement --- quantum information theory --- geometrical optics restricted eavesdropping --- secret key distillation --- satellite-to-satellite --- physical layer security --- secret key generation --- injection attacks --- jamming attacks --- pilot randomization --- clock synchronization --- Bayesian statistics --- oblivious transfer --- post-quantum cryptography --- universal composability --- n/a --- mean-king's problem --- mean multi-kings' problem
Listing 1 - 10 of 10 |
Sort by
|