نتایج جستجو برای: digital public control
تعداد نتایج: 1933416 فیلتر نتایج به سال:
INTRODUCTION ................................................................................... 403 I. THE PUBLIC FIGURE CONCEPT IN DEFAMATION LAW: FROM NEW YORK TIMES TO GERTZ ..................................... 404 II. THE ROAD NOT TAKEN: ROSENBLOOM V. METROMEDIA . 408 III. WHY ROSENBLOOM, NOT GERTZ, OFFERS THE BEST STANDARD FOR DECIDING DEFAMATION CLAIMS IN THE DIGITAL AGE. .................
The MiniCA project is proposed and developed to address growing demand for inexpensive access to security features such as privacy, strong authentication, and digital signatures. These features are integral to publickey encryption technologies. Digital certificates are vital in improving access to and use of new security technologies. Granting and revocation of digital certificates is overseen ...
Long before the advent of electronic systems, different methods of information scrambling were used. Early attempts at data security in electronic computers employed some of the same transformations. Modern secret key cryptography brought much greater security, but eventually proved vulnerable to brute-force attacks. Public key cryptography has now emerged as the core technology for modern comp...
Some of the cultural works which are considered as cultural heritage, regardless of their antiquity and precedence, are simultaneously subject of the legal systems of intellectual property rights and cultural heritage law. This situation can lead to a conflict of interest between private ownership and public law which, in turn, may create many problems for the management of cultural heritage wh...
Digital watermarks have been proposed as a method for discouraging illicit copying and distribution of copyright material. This paper presents a new approach for the secure and robust copyright protection of digital images. The digital watermarks described in this paper are designed to be, as far as possible, invariant against image transformations such as rotation, translation, scaling and cro...
In this paper we explore the types of encounters that technology enables. We consider the differences between digital and non-digital encounters through two pilot studies carried out in the city of Bath, UK. We investigate how technology can be appropriated for shared interactions that support conscious (or unconscious) social encounters and highlight the importance of space and the role of pla...
Analysis of the currency networks is not easy as the transactions are not centralized but rather take place over a large number of banks and commercial entities. Digital crypto currencies, however, require a public ledger to work and provide an opportunity for analysis of currency transactions. A crypto currency is a medium of exchange using cryptography to secure the transactions and to contro...
Public watermarks allow embedded signals to be extracted from audio and video content for a variety of purposes. One application is for copyright control, where it is envisaged that digital video recorders will not permit the recording of content that is watermarked as "never copy". In such a scenario, it is important that the watermark survive both normal signal transformations and attempts to...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید