Encryption and surveillance

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security of Symmetric Encryption against Mass Surveillance

Motivated by revelations concerning population-wide surveillance of encrypted communications, we formalize and investigate the resistance of symmetric encryption schemes to mass surveillance. The focus is on algorithm-substitution attacks (ASAs), where a subverted encryption algorithm replaces the real one. We assume that the goal of “big brother” is undetectable subversion, meaning that cipher...

متن کامل

Authentication and Encryption in the Snow Disease Surveillance Network

The paper presents how authentication and encryption is implemented in the Snow disease surveillance network. Requirements for the authentication mechanism were collected from General Practitioners (GPs). The identity of each Snow user is preserved across health institutions allowing GPs to move freely between health institutions and use the system independent of location. This ability is combi...

متن کامل

Compression Independent Reversible Encryption for Privacy in Video Surveillance

One of the main concerns of the wide use of video surveillance is the loss of individual privacy. Individuals who are not suspects need not be identified on camera recordings. Mechanisms that protect the identity while ensuring legitimate security needs are necessary. Selectively encrypting regions that reveal identity (e.g., faces or vehicle tags) are necessary to preserve individuals’ right t...

متن کامل

Embedded Real-Time Video Encryption Module on UAV Surveillance Systems

A real-time video encryption module, developed to be used on an electrical accelerated mini-helicopter (UAV), is presented in this paper. The surveillance system is composed from six modules: image capture, encryption, two radio link modules, decryption and display module. The hart of the encryption system is the CV700C motherboard and it’s VIA C7 microprocessor with ultra low power consumption...

متن کامل

Browse searchable encryption schemes: Classification, methods and recent developments

With the advent of cloud computing, data owners tend to submit their data to cloud servers and allow users to access data when needed. However, outsourcing sensitive data will lead to privacy issues. Encrypting data before outsourcing solves privacy issues, but in this case, we will lose the ability to search the data. Searchable encryption (SE) schemes have been proposed to achieve this featur...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Communications of the ACM

سال: 2019

ISSN: 0001-0782,1557-7317

DOI: 10.1145/3319079