You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the refereed proceedings of the 9th International Symposium on Privacy Enhancing Technologies, PETS 2009, held in Seattle, WA, USA, in August 2009. The 14 revised full papers presented were carefully reviewed and selected from 44 initial submissions. The papers - both from academia and industry - cover design and realization of privacy services for the internet and other communication networks and present novel research on all theoretical and practical aspects of privacy technologies, as well as experimental studies of fielded systems.
A biography of Tor—a cultural and technological history of power, privacy, and global politics at the internet's core. Tor, one of the most important and misunderstood technologies of the digital age, is best known as the infrastructure underpinning the so-called Dark Web. But the real “dark web,” when it comes to Tor, is the hidden history brought to light in this book: where this complex and contested infrastructure came from, why it exists, and how it connects with global power in intricate and intimate ways. In Tor: From the Dark Web to the Future of Privacy, Ben Collier has written, in essence, a biography of Tor—a cultural and technological history of power, privacy, politics, ...
This book constitutes the refereed proceedings of the 7th International Conference on Applied Cryptography and Network Security, ACNS 2009, held in Paris-Rocquencourt, France, in June 2009. The 32 revised full papers presented were carefully reviewed and selected from 150 submissions. The papers are organized in topical sections on key exchange, secure computation, public-key encryption, network security, traitor tracing, authentication and anonymity, hash fundtions, lattices, and side-channel attacks.
This volume contains the proceedings of the 13th International Conference on Financial Cryptography and Data Security, held at the Accra Beach Hotel and Resort, Barbados, February 23–26, 2009. Financial Cryptography and Data Security (FC) is a well-established int- national forum for research, advanced development, education, exploration and debate regarding information assurance in the context of ?nance and commerce. The conference covers all aspects of securing transactions and systems. The goal of FC is to bring security and cryptography researchers and pr- titioners together with economists, bankers, and policy makers. This year, we assembled a vibrant program featuring 21 peer-reviewe...
This volume contains the workshopproceedings of the accompanying workshops of the 14th Financial Cryptograpy and Data Security International Conference 2010, held on Tenerife, Canary Islands, Spain, January 25-28, 2010. FinancialCryptographyandData Securityis a majorinternationalforumfor research, advanced development, education, exploration, and debate regarding information assurance, with a speci?c focus on commercial contexts. The c- ference covers all aspects of securing transactions and systems and especially encourages original work focusing on both fundamental and applied real-world deployments on all aspects surrounding commerce security. Three workshops were co-located with FC 2010:...
A collection of public talks by hacker, photographer, cypherpunk and civil liberties activist Jacob Appelbaum. This books includes the following transcripts: “Personal experiences bringing technology and new media to disaster areas” (2005), covering technology, culture, the Creative Commons and the media with regards to disaster areas and warzones (travels to Iraq, crossing the border by foot, the installing of Internet satellites in Kurdistan, and his visit of New Orleans post-Hurricane Katrina); “Not my Department”, the opening keynote of the 29th Chaos Communication Congress (2012); Appelbaum’s testimony at the LIBE Committee Inquiry Electronic Mass Surveillance of EU Citizens (2013).
This book constitutes the thoroughly refereed post-proceedings of the 8th International Symposium on Privacy Enhancing Technologies, PET 2008, held in Leuven, Belgium, in July 2008 in conjunction with WOTE 2008, the IAVoSS Workshop on Trustworthy Elections. The 13 revised full papers presented were carefully selected from 48 submissions during two rounds of reviewing and improvement. The papers - both from academia and industry - cover design and realization of privacy services for the internet and other communication networks and present novel research on all theoretical and practical aspects of privacy technologies, as well as experimental studies of fielded systems.
This book is a collection of the ICAME41 conference proceedings covering a range of topics in corpus linguistics. Busse et al. Explore contemporary trends and new directions in the field. Papers focusing on historical linguistics include Bohmann et al's study on the passive alternation in 19th and 20th century American English whilst Iyeiri and Fukunaga investigate negation in 19th century American missionary documents. Bohmann's emphasis is on the Contrastive usage profiling method to represent online discourse data. Empirical studies on discourse analysis include Brooks' analysis of how the UK press portrays obesity, Coats generating ASR transcripts to look at dialect data from YouTube, and Gonzalez-Cruz's pragmatic considerations of Anglicisms entering Canarian-Spanish digital headlines. Schneider use statistical models to look at language comprehension in an eye-tracking corpus.