Narrow your search

Library

KU Leuven (5)

VDIC (5)

FARO (1)

LUCA School of Arts (1)

Odisee (1)

Thomas More Kempen (1)

Thomas More Mechelen (1)

UCLL (1)

UGent (1)

ULB (1)

More...

Resource type

book (5)


Language

English (5)


Year
From To Submit

2013 (1)

2010 (1)

2008 (1)

2007 (1)

1993 (1)

Listing 1 - 5 of 5
Sort by

Book
Computer models of the human body signature for sensing through the wall radar applications
Authors: --- --- ---
Year: 2007 Publisher: Adelphi, MD : Army Research Laboratory,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Validation of Xpatch computer models for human body radar signature
Authors: --- ---
Year: 2008 Publisher: Adelphi, MD : Army Research Laboratory,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Next Generation Jammer : DOD should continue to assess potential duplication and overlap as program moves forward : report to congressional committees.
Author:
Year: 2013 Publisher: [Washington, D.C.] : United States Government Accountability Office,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Electronic warfare
Author:
Year: 1993 Publisher: Washington, D.C. United States. Government Accountability Office

Loading...
Export citation

Choose an application

Bookmark

Abstract

Privacy on the line
Authors: --- --- ---
ISBN: 9780262256018 0262256010 9780262042406 1282096265 9786612096266 0262262517 0262514001 0262042401 9780262514002 Year: 2010 Publisher: Cambridge, Massachusetts ; [Piscataqay, New Jersey] MIT Press IEEE Xplore

Loading...
Export citation

Choose an application

Bookmark

Abstract

Telecommunication has never been perfectly secure. The Cold War culture of recording devices in telephone receivers and bugged embassy offices has been succeeded by a post-9/11 world of NSA wiretaps and demands for data retention. Although the 1990s battle for individual and commercial freedom to use cryptography was won, growth in the use of cryptography has been slow. Meanwhile, regulations requiring that the computer and communication industries build spying into their systems for government convenience have increased rapidly. The application of the 1994 Communications Assistance for Law Enforcement Act has expanded beyond the intent of Congress to apply to voice over Internet Protocol (VoIP) and other modern data services; attempts are being made to require ISPs to retain their data for years in case the government wants it; and data mining techniques developed for commercial marketing applications are being applied to widespread surveillance of the population. In Privacy on the Line, Whitfield Diffie and Susan Landau strip away the hype surrounding the policy debate over privacy to examine the national security, law enforcement, commercial, and civil liberties issues. They discuss the social function of privacy, how it underlies a democratic society, and what happens when it is lost. This updated and expanded edition revises their original - and prescient - discussions of both policy and technology in light of recent controversies over NSA spying and other government threats to communications privacy.

Listing 1 - 5 of 5
Sort by