You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
None
First multi-year cumulation covers six years: 1965-70.
What constitutes an identity, how do new technologies affect identity, how do we manage identities in a globally networked information society? The increasing div- sity of information and communication technologies and their equally wide range of usage in personal, professional and official capacities raise challenging questions of identity in a variety of contexts. The aim of the IFIP/FIDIS Summer Schools has been to encourage young a- demic and industry entrants to share their own ideas about privacy and identity m- agement and to build up collegial relationships with others. As such, the Summer Schools have been introducing participants to the social implications of information technology...
Expanded into two volumes, the Second Edition of Springer’s Encyclopedia of Cryptography and Security brings the latest and most comprehensive coverage of the topic: Definitive information on cryptography and information security from highly regarded researchers Effective tool for professionals in many fields and researchers of all levels Extensive resource with more than 700 contributions in Second Edition 5643 references, more than twice the number of references that appear in the First Edition With over 300 new entries, appearing in an A-Z format, the Encyclopedia of Cryptography and Security provides easy, intuitive access to information on all aspects of cryptography and security. As ...
The increasing diversity of Infonnation Communication Technologies and their equally diverse range of uses in personal, professional and official capacities raise challenging questions of identity in a variety of contexts. Each communication exchange contains an identifier which may, or may not, be intended by the parties involved. What constitutes an identity, how do new technologies affect identity, how do we manage identities in a globally networked infonnation society? th th From the 6 to the 10 August 2007, IFIP (International Federation for Infonnation Processing) working groups 9. 2 (Social Accountability), 9. 6/11. 7 (IT rd Misuse and the Law) and 11. 6 (Identity Management) hold the...
This book constitutes the thoroughly refereed post conference proceedings of the 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, held in Helsingborg, Sweden, in August 2010. The 27 revised papers were carefully selected from numerous submissions during two rounds of reviewing. They are organized in topical sections on terminology, privacy metrics, ethical, social, and legal aspects, data protection and identity management, eID cards and eID interoperability, emerging technologies, privacy for eGovernment and AAL applications, social networks and privacy, privacy policies, and usable privacy.
This book constitutes the thoroughly refereed post conference proceedings of the 5th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, held in Nice, France, in September 2009. The 25 revised papers were carefully selected from numerous submissions during two rounds of reviewing. They are organized in topical sections on lifelong privacy, privacy for social network sites and collaborative systems, privacy for e-government applications, privacy and identity management for e-health and ambient assisted living applications, anonymisation and privacy-enhancing technologies, identity management and multilateral security, and usability, awareness and transparency tools.
On the same summer day in 1942, Saint Teresa Benedicta of the Cross (Edith Stein) and hundreds of other Catholic Jews were arrested in Holland by the occupying Nazis. One hundred thirteen of those taken into custody, several of them priests and nuns, perished at Auschwitz and other concentration camps. They were murdered in retaliation for the anti-Nazi pastoral letter written by the Dutch Catholic bishops. While Saint Teresa Benedicta is the most famous member of this group, having been canonized by Pope John Paul II in 1998, all of them deserve the title of martyr, for they were killed not only because they were Jews but also because of the faith of the Church, which had compelled the Dutc...
What are the basic principles underlying European Community Law? Although no one seeks a purely descriptive answer to this question, the discussion it gives rise to is of immense significance both for theoretical legal studies and for legal practice. Over the years, scholars have convened from time to time to re-examine the question in the light of new developments. This important volume offers insights and findings of the latest such conference, held at Stockholm in March 2007, and sponsored by the Swedish Network for European Legal Studies. The nineteen essays here printed are all final author-edited versions of papers first presented at that conference. Far from merely an updating of the ...