Results for 'encryption'

126 found
Order:
  1.  31
    Encrypting human rights: The intertwining of resistant voices in the UK state surveillance debate.James Allen-Robertson & Amy Stevens - 2021 - Big Data and Society 8 (1).
    The Snowden revelations in 2013 redrew the lines of debate surrounding surveillance, exposing the extent of state surveillance across multiple nations and triggering legislative reform in many. In the UK, this was in the form of the Investigatory Powers Act. As a contribution to understanding resistance to expanding state surveillance activities, this article reveals the intertwining of diverse interests and voices which speak in opposition to UK state surveillance. Through a computational topic modelling-based mixed methods analysis of the submissions made (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  2.  21
    Encryption of graphic information by means of transformation matrixes for protection against decofing by neural algorithms.Yunak O. M., Stryxaluk B. M. & Yunak O. P. - 2020 - Artificial Intelligence Scientific Journal 25 (2):15-20.
    The article deals with the algorithm of encrypting graphic information using transformation matrixes. It presents the actions that can be done with the image. The article also gives algorithms for forming matrixes that are created with the use of random processes. Examples of matrixes and encryption results are shown. Calculations of the analysis of combinations and conclusions to them are carried out. The article shows the possibilities and advantages of this image encryption algorithm. The proposed algorithm will allow (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  3.  41
    Synergistic Information Processing Encrypts Strategic Reasoning in Poker.Seth Frey, Dominic K. Albino & Paul L. Williams - 2018 - Cognitive Science 42 (5):1457-1476.
    There is a tendency in decision‐making research to treat uncertainty only as a problem to be overcome. But it is also a feature that can be leveraged, particularly in social interaction. Comparing the behavior of profitable and unprofitable poker players, we reveal a strategic use of information processing that keeps decision makers unpredictable. To win at poker, a player must exploit public signals from others. But using public inputs makes it easier for an observer to reconstruct that player's strategy and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  4.  27
    Encryption of Data Streams using Pauli spins ½ matrices.D. Sravana Kurmar, C. H. Suneetha & A. Chandra Sekhar - 2010 - In Giselle Walker & Elisabeth Leedham-Green (eds.), Identity. New York: Cambridge University Press. pp. 10--01.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  5.  15
    A Color Image Encryption Scheme Based on a Novel 3D Chaotic Mapping.Chunyuan Liu & Qun Ding - 2020 - Complexity 2020:1-20.
    Low-dimensional chaotic mappings are simple functions that have low computation cost and are easy to realize, but applying them in a cryptographic algorithm will lead to security vulnerabilities. To overcome this shortcoming, this paper proposes the coupled chaotic system, which coupled the piecewise and Henon mapping. Simulation results indicate that the novel mapping has better complexity and initial sensitivity and larger key space compared with the original mapping. Then, a new color image encryption algorithm is proposed based on the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  6. Encrypted vanguards and bleeding-edge technologies : signals intelligence, radio drama, and the false transmissions of the special operations executive.James Harding - 2015 - In Kimberly Jannarone (ed.), Vanguard performance beyond left and right. Ann Arbor: Univ Of Michigan Press.
     
    Export citation  
     
    Bookmark  
  7.  21
    A Novel Image Encryption Scheme Based on PWLCM and Standard Map.Yucheng Chen, Chunming Tang & Zongxiang Yi - 2020 - Complexity 2020:1-23.
    In the past decades, considerable attention has been paid to the chaos-based image encryption schemes owing to their characteristics such as extreme sensitivity to initial conditions and parameters, pseudo-randomness, and unpredictability. However, some schemes have been proven to be insecure due to using a single chaotic system. To increase the security, this work proposes a novel image encryption scheme based on the piecewise linear chaotic map and the standard map. To the best of our knowledge, it is the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  8.  18
    A New Multistage Encryption Scheme Using Linear Feedback Register and Chaos-Based Quantum Map.Adel R. Alharbi, Jawad Ahmad, Undefined Arshad, Sajjad Shaukat Jamal, Fawad Masood, Yazeed Yasin Ghadi, Nikolaos Pitropakis & William J. Buchanan - 2022 - Complexity 2022:1-15.
    With the increasing volume of data transmission through insecure communication channels, big data security has become one of the important concerns in the cybersecurity domain. To address these concerns and keep data safe, a robust privacy-preserving cryptosystem is necessary. Such a solution relies on chaos encryption algorithms over standard cryptographic methods that possess multistage encryption levels, including high speed, high security, low compute overheads, and procedural power, among other characteristics. In this work, a secure image encryption scheme (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  9.  22
    A Color Image Encryption Technique Based on Bit-Level Permutation and Alternate Logistic Maps.Priyanka Jaroli, Shelza Dua, Mohit Dua & Ankita Bisht - 2019 - Journal of Intelligent Systems 29 (1):1246-1260.
    The paper presents an approach to encrypt the color images using bit-level permutation and alternate logistic map. The proposed method initially segregates the color image into red, green, and blue channels, transposes the segregated channels from the pixel-plane to bit-plane, and scrambles the bit-plane matrix using Arnold cat map (ACM). Finally, the red, blue, and green channels of the scrambled image are confused and diffused by applying alternate logistic map that uses a four-dimensional Lorenz system to generate a pseudorandom number (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  10.  21
    Fast and Robust Image Encryption Scheme Based on Quantum Logistic Map and Hyperchaotic System.Nehal Abd El-Salam Mohamed, Aliaa Youssif & Hala Abdel-Galil El-Sayed - 2022 - Complexity 2022 (1):3676265.
    Topic of quantum chaos has begun to draw increasing attention in recent years. So, to ensure the security of digital image, an image encryption algorithm based on combining a hyperchaotic system and quantum 3D logistic map is proposed. This algorithm is applied in four stages. Initially, the key generator builds upon the foundation of mean for any row or column of the edges of the plain image. Its output value is used to yield initial conditions and parameters of the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  11.  20
    A Simple Image Encryption Based on Binary Image Affine Transformation and Zigzag Process.Adélaïde Nicole Kengnou Telem, Cyrille Feudjio, Balamurali Ramakrishnan, Hilaire Bertrand Fotsin & Karthikeyan Rajagopal - 2022 - Complexity 2022:1-22.
    In this paper, we propose a new and simple method for image encryption. It uses an external secret key of 128 bits long and an internal secret key. The novelties of the proposed encryption process are the methods used to extract an internal key to apply the zigzag process, affine transformation, and substitution-diffusion process. Initially, an original gray-scale image is converted into binary images. An internal secret key is extracted from binary images. The two keys are combined to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  12.  31
    Pseudorandom Number Generator Based on Three Kinds of Four-Wing Memristive Hyperchaotic System and Its Application in Image Encryption.Xi Chen, Shuai Qian, Fei Yu, Zinan Zhang, Hui Shen, Yuanyuan Huang, Shuo Cai, Zelin Deng, Yi Li & Sichun Du - 2020 - Complexity 2020:1-17.
    In this paper, we propose a method to design the pseudorandom number generator using three kinds of four-wing memristive hyperchaotic systems with different dimensions as multientropy sources. The principle of this method is to obtain pseudorandom numbers with good randomness by coupling XOR operation on the three kinds of FWMHSs with different dimensions. In order to prove its potential application in secure communication, the security of PRNG based on this scheme is analyzed from the perspective of cryptography. In addition, PRNG (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  13.  29
    A protocol to encrypt digital images using chaotic maps and memory cellular automata.A. M. del Rey, G. R. Sanchez & A. de la Villa Cuenca - 2015 - Logic Journal of the IGPL 23 (3):485-494.
    Direct download  
     
    Export citation  
     
    Bookmark  
  14. Computer Ethics: Encryption: Dvd.Ken Knisely & Patrick Sullivan - 2001 - Milk Bottle Productions.
    Should all digital communication be accessible to government inspection? Is robust cryptography in the hands of the public a threat to our national security? With Dorothy Denning and Patrick Sullivan.
     
    Export citation  
     
    Bookmark  
  15.  22
    An Effective Chaos-Based Image Encryption Scheme Using Imitating Jigsaw Method.Zhen Li, Changgen Peng, Weijie Tan & Liangrong Li - 2021 - Complexity 2021:1-18.
    In this paper, an efficient chaos-based image encryption scheme is proposed, which uses the imitating jigsaw method containing revolving and shifting operations. In this scheme, there are three processes in encryption: preprocessing, encryption process, and postprocessing. In the preprocessing, the original image is partitioned into 64 × 64 pixel image blocks and then randomly revolved and shifted under control sequences which are generated by the hyperchaotic Lorenz system whose initial conditions are calculated by original image and keys. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  16.  25
    Quantum Particle Swarm Optimization Extraction Algorithm Based on Quantum Chaos Encryption.Chao Li, Mengna Shi, Yanqi Zhou & Erfu Wang - 2021 - Complexity 2021:1-21.
    Considering the highly complex structure of quantum chaos and the nonstationary characteristics of speech signals, this paper proposes a quantum chaotic encryption and quantum particle swarm extraction method based on an underdetermined model. The proposed method first uses quantum chaos to encrypt the speech signal and then uses the local mean decomposition method to construct a virtual receiving array and convert the underdetermined model to a positive definite model. Finally, the signal is extracted using the Levi flight strategy based (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  17.  22
    Privacy and the encryption debate.Adam Moore - 2000 - Knowledge, Technology & Policy 12 (4):72-84.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  18. Computer Ethics: Encryption: No Dogs or Philosophers Allowed.Ken Knisely, Dorothy Denning & Patrick Sullivan - forthcoming - DVD.
    Should all digital communication be accessible to government inspection? Is robust cryptography in the hands of the public a threat to our national security? With Dorothy Denning and Patrick Sullivan.
     
    Export citation  
     
    Bookmark  
  19. Offline privacy preserving proxy re-encryption in mobile cloud computing.Yaping Lin & Voundi Koe Arthur Sandor - 2019 - Pervasive and Mobile Computing 59.
    This paper addresses the always online behavior of the data owner in proxy re- encryption schemes for re-encryption keys issuing. We extend and adapt multi-authority ciphertext policy attribute based encryption techniques to type-based proxy re-encryption to build our solution. As a result, user authentication and user authorization are moved to the cloud server which does not require further interaction with the data owner, data owner and data users identities are hidden from the cloud server, and re- (...) keys are only issued to legitimate users. An in depth analysis shows that our scheme is secure, flexible and efficient for mobile cloud computing. (shrink)
    Direct download  
     
    Export citation  
     
    Bookmark  
  20.  31
    Prosody in spontaneous humor: Evidence for encryption.Thomas Flamson, Gregory A. Bryant & H. Clark Barrett - 2011 - Pragmatics and Cognition 19 (2):248-267.
    The study of conversational humor has received relatively little empirical attention with almost no examinations of the role of vocal signals in spontaneous humor production. Here we report an analysis of spontaneous humorous speech in a rural Brazilian collective farm. The sample was collected over the course of ethnographic fieldwork in northeastern Brazil, and is drawn specifically from the monthly communal business meetings conducted in Portuguese. Our analyses focused on humorous utterances identified by the subsequent presence of laughter. Acoustic features (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  21.  21
    Performance of the 2D Coupled Map Lattice Model and Its Application in Image Encryption.Zhuo Liu, Jin Yuan Liu, Leo Yu Zhang, Yong Zhao & Xiao Feng Gong - 2022 - Complexity 2022:1-18.
    The two-dimensional coupled map lattice model has been extensively employed as the basis component for designing various schemes in the cryptography system due to its complicated chaotic dynamic behavior. In this study, we analyze the chaotic characteristics of the 2D CML model, such as the Lyapunov exponent, synchronization stability, bifurcation, and ergodicity. We then show that the chaotic sequences generated by the 2D CML model are random according to the NIST testing. Furthermore, we propose an image encryption scheme based (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  22.  13
    A New Algorithm Based on Magic Square and a Novel Chaotic System for Image Encryption.Sadiq A. Mehdi & Rageed Hussein Al-Hashemy - 2019 - Journal of Intelligent Systems 29 (1):1202-1215.
    This article introduces a simple and effective new algorithm for image encryption using a chaotic system which is based on the magic squares. This novel 3D chaotic system is invoked to generate a random key to encrypt any color image. A number of chaotic keys equal to the size of the image are generated by this chaotic system and arranged into a matrix then divided into non-overlapped submatrices. The image to be encrypted is also divided into sub-images, and each (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  23.  19
    HWCD: A hybrid approach for image compression using wavelet, encryption using confusion, and decryption using diffusion scheme.Alagarswamy Ramaprasath & Heggere Rangaswamaiah Latha - 2023 - Journal of Intelligent Systems 32 (1).
    Image data play important role in various real-time online and offline applications. Biomedical field has adopted the imaging system to detect, diagnose, and prevent several types of diseases and abnormalities. The biomedical imaging data contain huge information which requires huge storage space. Moreover, currently telemedicine and IoT based remote health monitoring systems are widely developed where data is transmitted from one place to another. Transmission of this type of huge data consumes more bandwidth. Along with this, during this transmission, the (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  24.  11
    Josephson Junction Model: FPGA Implementation and Chaos-Based Encryption of sEMG Signal through Image Encryption Technique.Colince Welba, Dhanagopal Ramachandran, Alexendre Noura, Victor Kamdoum Tamba, Sifeu Takougang Kingni, Pascal Eloundou Ntsama & Pierre Ele - 2022 - Complexity 2022:1-14.
    The field programmable gate array implementation of the nonlinear resistor-capacitor-inductor shunted Josephson junction model and its application to sEMG signal encryption through image encrypted technique are reported in this study. Thanks to the numerical simulations and FPGA implementation of the NRCISJJ model, different shapes of chaotic attractors are revealed by varying the parameters. The chaotic behaviour found in the NRCISJJ model is used to encrypt the sEMG signal through image encryption technique. The results obtained are interesting and open (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  25. Efficient Privacy-Preserving Protocol for k-NN Search over Encrypted Data in Location-Based Service.Huijuan Lian, Weidong Qiu, Zheng di YanHuang & Jie Guo - 2017 - Complexity:1-14.
    With the development of mobile communication technology, location-based services are booming prosperously. Meanwhile privacy protection has become the main obstacle for the further development of LBS. The k-nearest neighbor search is one of the most common types of LBS. In this paper, we propose an efficient private circular query protocol with high accuracy rate and low computation and communication cost. We adopt the Moore curve to convert two-dimensional spatial data into one-dimensional sequence and encrypt the points of interest information with (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  26.  17
    Clouded data: Privacy and the promise of encryption.Liam Magee, Tsvetelina Hristova & Luke Munn - 2019 - Big Data and Society 6 (1).
    Personal data is highly vulnerable to security exploits, spurring moves to lock it down through encryption, to cryptographically ‘cloud’ it. But personal data is also highly valuable to corporations and states, triggering moves to unlock its insights by relocating it in the cloud. We characterise this twinned condition as ‘clouded data’. Clouded data constructs a political and technological notion of privacy that operates through the intersection of corporate power, computational resources and the ability to obfuscate, gain insights from and (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  27.  79
    A Novel Security Methodology for Smart Grids: A Case Study of Microcomputer-Based Encryption for PMU Devices.Metin Varan, Akif Akgul, Fatih Kurugollu, Ahmet Sansli & Kim Smith - 2021 - Complexity 2021:1-15.
    Coordination of a power system with the phasor measurement devices in real time on the load and generation sides is carried out within the context of smart grid studies. Power systems equipped with information systems in a smart grid pace with external security threats. Developing a smart grid which can resist against cyber threats is considered indispensable for the uninterrupted operation. In this study, a two-way secure communication methodology underpinned by a chaos-based encryption algorithm for PMU devices is proposed. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  28.  21
    Health data privacy through homomorphic encryption and distributed ledger computing: an ethical-legal qualitative expert assessment study.Effy Vayena, Marcello Ienca & James Scheibner - 2022 - BMC Medical Ethics 23 (1):1-13.
    BackgroundIncreasingly, hospitals and research institutes are developing technical solutions for sharing patient data in a privacy preserving manner. Two of these technical solutions are homomorphic encryption and distributed ledger technology. Homomorphic encryption allows computations to be performed on data without this data ever being decrypted. Therefore, homomorphic encryption represents a potential solution for conducting feasibility studies on cohorts of sensitive patient data stored in distributed locations. Distributed ledger technology provides a permanent record on all transfers and processing (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  29.  16
    A New Fractional-Order Map with Infinite Number of Equilibria and Its Encryption Application.Ahlem Gasri, Amina-Aicha Khennaoui, Adel Ouannas, Giuseppe Grassi, Apostolos Iatropoulos, Lazaros Moysis & Christos Volos - 2022 - Complexity 2022:1-18.
    The study of the chaotic dynamics in fractional-order discrete-time systems has received great attention over the last years. Some efforts have been also devoted to analyze fractional maps with special features. This paper makes a contribution to the topic by introducing a new fractional map that is characterized by both particular dynamic behaviors and specific properties related to the system equilibria. In particular, the conceived one dimensional map is algebraically simpler than all the proposed fractional maps in the literature. Using (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  30.  18
    Development of a Family of Chaotic Systems with Infinite Equilibria and Its Application for Image Encryption.Xiaofeng Li, Yulong Bai, Weishuan Pan & Yong-Jie di WangMa - 2022 - Complexity 2022:1-18.
    Fourth-order autonomous nonlinear differential equations can exhibit chaotic properties. In this study, we propose a family of fourth-order chaotic systems with infinite equilibrium points whose equilibria form closed curves of different shapes. First, the phase diagrams and Lyapunov exponents of the system family are simulated. The results show that the system family has complex phase diagrams and dynamic behaviors. Simulation analysis of the Poincarè mapping and bifurcation diagrams shows that the system has chaotic characteristics. The circuit simulation model is constructed (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  31.  12
    A Three-Dimensional Autonomous System with a Parabolic Equilibrium: Dynamical Analysis, Adaptive Synchronization via Relay Coupling, and Applications to Steganography and Chaos Encryption.Janarthanan Ramadoss, Romanic Kengne, Dianorré Tokoue Ngatcha, Victor Kamdoum Tamba, Karthikeyan Rajagopal & Marceline Motchongom Tingue - 2022 - Complexity 2022:1-12.
    This paper is reporting on electronic implementation of a three-dimensional autonomous system with infinite equilibrium point belonging to a parabola. Performance analysis of an adaptive synchronization via relay coupling and a hybrid steganography chaos encryption application are provided. Besides striking parabolic equilibrium, the proposed three-dimensional autonomous system also exhibits hidden chaotic oscillations as well as hidden chaotic bursting oscillations. Electronic implementation of the hidden chaotic behaviors is done to confirm their physical existence. A good qualitative agreement is shown between (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  32.  61
    A world of strong privacy: Promises and perils of encryption: David Friedman.David Friedman - 1996 - Social Philosophy and Policy 13 (2):212-228.
    A major theme in discussions of the influence of technology on society has been the computer as a threat to privacy. It now appears that the truth is precisely the opposite. Three technologies associated with computers—public-key encryption, networking, and virtual reality—are in the process of giving us a level of privacy never known before. The U.S. government is currently intervening in an attempt, not to protect privacy, but to prevent it.
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  33.  29
    Exhuming the remains of Antigone's tragedy : the encryption of slavery.Tina Chanter - 2015 - In .
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  34. A prolific paradox of justice and two theses on the encryption of the hidden people.Ricardo Sanín-Restrepo & Marinella Machado-Araujo - 2025 - In Ricardo Sanín Restrepo, Marinella Machado Araujo & Sabelo J. Ndlovu-Gatsheni (eds.), Decrypting justice: from epistemic violence to immanent democracy. Lanham, Maryland: Lexington Books.
     
    Export citation  
     
    Bookmark  
  35. Multiple layers of asylum access in Mexico : an example of the encryption of administrative justice.Luisa Gabriela Morales-Vega - 2025 - In Ricardo Sanín Restrepo, Marinella Machado Araujo & Sabelo J. Ndlovu-Gatsheni (eds.), Decrypting justice: from epistemic violence to immanent democracy. Lanham, Maryland: Lexington Books.
     
    Export citation  
     
    Bookmark  
  36. Proof checking the rsa public key encryption algorithm.Robert Boyer - unknown
    The development of mathematics toward greater precision has led, as is well known, to the formalization of large tracts of it, so that one can prove any theorem using nothing but a few mechanical rules. -- Godel [11].
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  37.  19
    “The most noble of any that ever lived in this world”: an encrypted text praising Thomas More’s daughter Margaret, contained in a miniature Qurʾan at the Bodleian Libraries.Claudia Colini & Cornelius Berthold - 2023 - Moreana 60 (1):95-113.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  38. Privacy on the Line: The Politics of Wiretapping and Encryption.S. Martin - 1999 - Knowledge, Technology & Policy 12 (2):79-80.
     
    Export citation  
     
    Bookmark  
  39. Plenary Discussion: Towards a Socio-technical Research Agenda for Community Informatics-Cryptographic Algorithms and Protocols-Public-Key Encryption from ID-Based Encryption Without One-Time.Chik How Tan - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes In Computer Science. Springer Verlag. pp. 450-459.
    No categories
     
    Export citation  
     
    Bookmark  
  40. The communal practice of quilombismo as a technique of decryption : forms of (r)existence through the subversion of colonial encryption.Bethania Assy & Rafael Rolo - 2025 - In Ricardo Sanín Restrepo, Marinella Machado Araujo & Sabelo J. Ndlovu-Gatsheni (eds.), Decrypting justice: from epistemic violence to immanent democracy. Lanham, Maryland: Lexington Books.
     
    Export citation  
     
    Bookmark  
  41. Prologue : a conceptual framework of the theory of encryption of power.Ricardo Sanín Restrepo - 2025 - In Ricardo Sanín Restrepo, Marinella Machado Araujo & Sabelo J. Ndlovu-Gatsheni (eds.), Decrypting justice: from epistemic violence to immanent democracy. Lanham, Maryland: Lexington Books.
     
    Export citation  
     
    Bookmark  
  42.  85
    Privacy on the line: The politics of wiretapping and encryption by Whitfield diffie and Susan Landau. [REVIEW]Jean-Francois Blanchette - 1999 - Ethics and Information Technology 1 (2):167-169.
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark  
  43.  24
    Number(s) of Future(s), Number(s) of Faith(s): Call it a Day for Religion.Joanna Hodge - 2021 - Eidos. A Journal for Philosophy of Culture 5 (3):64-81.
    Encrypted in Derrida’s contribution to the Capri Seminar on Religion in 1994 are three retrievals: of his discussions of speech and of systems of inscription; of a concealment of splittings in the supposed continuities of traditions; and of a complicity between the operations of religion and those of a dissipation of the unities of science, Enlightenment, and knowledge, into proliferating autotelic tele-technologies. These retrievals take place between the lines of this discussion of faith, knowledge and religion, which arrives in two (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  44.  58
    Trusting third-party storage providers for holding personal information. A context-based approach to protect identity-related data in untrusted domains.Giulio Galiero & Gabriele Giammatteo - 2009 - Identity in the Information Society 2 (2):99-114.
    The never ending growth of digital information and the availability of low-cost storage facilities and networks capacity is leading users towards moving their data to remote storage resources. Since users’ data often holds identity-related information, several privacy issues arise when data can be stored in untrusted domains. In addition digital identity management is becoming extremely complicated due to the identity replicas proliferation necessary to get authentication in different domains. GMail and Amazon Web Services, for instance, are two examples of online (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  45. Implications of computer science theory for the simulation hypothesis.David Wolpert - manuscript
    The simulation hypothesis has recently excited renewed interest, especially in the physics and philosophy communities. However, the hypothesis specifically concerns {computers} that simulate physical universes, which means that to properly investigate it we need to couple computer science theory with physics. Here I do this by exploiting the physical Church-Turing thesis. This allows me to introduce a preliminary investigation of some of the computer science theoretic aspects of the simulation hypothesis. In particular, building on Kleene's second recursion theorem, I prove (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  46.  43
    Code as speech: A discussion of Bernstein V. USDOJ, karn V. USDOS, and junger V. Daley in light of the U.s. Supreme court's recent shift to federalism. [REVIEW]Jean Camp & K. Lewis - 2001 - Ethics and Information Technology 3 (1):21-33.
    The purpose of this paper is to address the question of whethercomputer source code is speech protected by the First Amendmentto the United States Constitution or whether it is merelyfunctional, a ``machine'', designed to fulfill a set task andtherefore bereft of protection. The answer to this question is acomplex one. Unlike all other forms of ``speech'' computer sourcecode holds a unique place in the law: it can be copyrighted, likea book and it can be patented like a machine or process.Case (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  47. Anachronistic Reading.J. Hillis Miller - 2010 - Derrida Today 3 (1):75-91.
    A poem encrypts, though not predictably, the effects it may have when at some future moment, in another context, it happens to be read and inscribed in a new situation, in ‘an interpretation that transforms the very thing it interprets’, as Jacques Derrida puts it in Specters of Marx. In Wallace Stevens's ‘The Man on the Dump’ (1942), we are told: ‘The dump is full/Of images’. The poem's movement is itself a complex temporal to and fro that aims to repudiate (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  48.  42
    From the selfish gene to selfish metabolism: Revisiting the central dogma.Víctor de Lorenzo - 2014 - Bioessays 36 (3):226-235.
    The standard representation of the Central Dogma (CD) of Molecular Biology conspicuously ignores metabolism. However, both the metabolites and the biochemical fluxes behind any biological phenomenon are encrypted in the DNA sequence. Metabolism constrains and even changes the information flow when the DNA‐encoded instructions conflict with the homeostasis of the biochemical network. Inspection of adaptive virulence programs and emergence of xenobiotic‐biodegradation pathways in environmental bacteria suggest that their main evolutionary drive is the expansion of their metabolic networks towards new chemical (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  49.  24
    An optimization of color halftone visual cryptography scheme based on Bat algorithm.Salama A. Mostafa, Ihsan Salman & Firas Mohammed Aswad - 2021 - Journal of Intelligent Systems 30 (1):816-835.
    Visual cryptography is a cryptographic technique that allows visual information to be encrypted so that the human optical system can perform the decryption without any cryptographic computation. The halftone visual cryptography scheme (HVCS) is a type of visual cryptography (VC) that encodes the secret image into halftone images to produce secure and meaningful shares. However, the HVC scheme has many unsolved problems, such as pixel expansion, low contrast, cross-interference problem, and difficulty in managing share images. This article aims to enhance (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  50.  36
    Towards data justice? The ambiguity of anti-surveillance resistance in political activism.Jonathan Cable, Arne Hintz & Lina Dencik - 2016 - Big Data and Society 3 (2).
    The Snowden leaks, first published in June 2013, provided unprecedented insights into the operations of state-corporate surveillance, highlighting the extent to which everyday communication is integrated into an extensive regime of control that relies on the ‘datafication’ of social life. Whilst such data-driven forms of governance have significant implications for citizenship and society, resistance to surveillance in the wake of the Snowden leaks has predominantly centred on techno-legal responses relating to the development and use of encryption and policy advocacy (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   15 citations  
1 — 50 / 126