13 Hits in 9.8 sec

SoK: Secure Messaging

Nik Unger, Sergej Dechand, Joseph Bonneau, Sascha Fahl, Henning Perl, Ian Goldberg, Matthew Smith
2015 2015 IEEE Symposium on Security and Privacy  
In this paper, we evaluate and systematize current secure messaging solutions and propose an evaluation framework for their security, usability, and ease-of-adoption properties.  ...  Motivated by recent revelations of widespread state surveillance of personal communication, many solutions now claim to offer secure and private messaging.  ...  ACKNOWLEDGMENTS The authors would like to thank the anonymous reviewers for their insightful comments, and Trevor Perrin and Henry Corrigan-Gibbs for their discussion and excellent feedback.  ... 
doi:10.1109/sp.2015.22 dblp:conf/sp/UngerDBFPG015 fatcat:ztmbqbcxojb2dlnhtqwjotl4qi

Portuguese SKA White Book [article]

Domingos Barbosa, Sonia Antón, João Paulo Barraca, Miguel Bergano, Alexandre C. M. Correia, Dalmiro Maia, Valério A. R. M. Ribeiro
2020 arXiv   pre-print
ACKNOWLEDGMENTS ACKNOWLEDGMENTS We warmly thank Francisco Colomer (JIVE -Joint Institute for VLBI in Europe ERIC) and Leonid Gurvitz (JIVE and Astrodynamics and Space Missions, TU Delft) for the long  ...  We warmly thank Arnold van Ardenne for invaluable comments and for the inspirational collaboration towards the "greening" of large scale science and the enhancement of its societal impact.  ...  The field deployment tool was developed as an Android application, at a first stage only available on a custom image of the Android Operating System, running on a tablet device.  ... 
arXiv:2005.01140v1 fatcat:gijmylrmvfcj3i7dt3wbsr6vhm

Regulating Habit-Forming Technology

Kyle Langvardt
2019 Social Science Research Network  
The Federal Trade Commission has also announced an investigation into the practice.  ...  As public concern mounts, it is surprisingly easy to envision consumer regulation extending beyond video games to other types of apps.  ...  And so on; these arguments lend themselves to efficient mass production.  ... 
doi:10.2139/ssrn.3351936 fatcat:xje675rxnrc5fkn5ifdlaz6esi

Money and Trust in Metaverses, Bitcoin and Stablecoins in global social XR [article]

John Joseph O'Hare, Allen Fairchild, Umran Ali
2022 arXiv   pre-print
This deployable lab is designed to inform development of secure value transaction, for small and medium sized companies.  ...  A high level overview of Web3 technologies leads to a description of blockchain, and the Bitcoin network is specifically selected for detailed examination.  ...  chose a checklist of interpersonal interactions which they used against recordings of conversations through the system [247] .  ... 
arXiv:2207.09460v1 fatcat:ssy7jc7kffeetn2pl5kuwr2qva

ijair-volume-6-issue-1-vii-january-march-2019 -HINDUSTAN BOOK.pdf

V. Thamilarasi
This paper experiments various basic image segmentation techniques for Lung Chest X-Ray images  ...  State can be embedded in the response messages to point to valid future states of the interaction. REST is an architectural style for designing distributed system.  ...  wide-ranging use of actual mobile health apps and accompanying estimate and wellness systems.  ... 
doi:10.6084/m9.figshare.20217722.v1 fatcat:l74ihuqhcvdtjomod3zdwzfniu

Coimbatore-6410 4243

Tadeusz Hryniewicz, Tomasz Borowski, B Ramani, Anand Paul, Mr Kumar, Mr Ravichandran Advisor, T Devi, Latha Parameswaran, Chairperson, Ms Sampath, Ms Shaju, Mr Prashanth
For an Internet-enabled WSN, it might be interesting to develop a distributed system that is able to record the interactions with the users of the system.  ...  An android phone application connects with the Bluetooth and is used for real time record of oxygen saturation.  ...  LOCAL vs EXTENDED The attacker makes control of various base stations or any vehicles to an local network is said to be an Local attacker, whereas the extended attacker makes control of a variety of base  ... 

Mapping Refugee Media Journeys Smartphones and Social Media Networks Research Report

Marie Gillespie, Lawrence Ampofo, Margaret Cheesman, Becky Faith, Evgenia Iliadou, Ali Issa, Souad Osseiran, Dimitris Skleparis
2016 unpublished
The smartphone is an essential tool for refugees because it provides access to a range of news and information resources that they depend on for their survival.  ...  The digital traces that refugees' phones leave behind make them vulnerable to surveillance and other dangers.  ...  The research benefitted from funding and support from The Open University's Centre for Research on Socio--Cultural Change ( and its Centre for Citizenship and Governance (  ... 

"No Country for E-Lit?" – India and Electronic Literature

Souvik Mukherjee
2017 Hyperrhiz  
selected medical records.  ...  mimicked, and replayed back, their version of the colonised.  ...  While enhancing efficiency and productivity, surveillance also focusses on a functioning bureaucracy to maintain power and control.  ... 
doi:10.20415/hyp/016.e08 fatcat:ik7x2ivbxjdljoxfh4pyk3vt3y

Dagstuhl Reports, Volume 7, Issue 4, April 2017, Complete Issue [article]

Japan Android app.  ...  It was pointed out that the usage of fingerprinting for authentication may be profitable, but in this case two fingerprints must be collected (one to use, another to store) to beat replay attacks.  ...  We cannot switch our technology off for the whole week. Opting-out is not an option because it takes too much effort. Opposition: These applications are something that we created ourselves.  ... 
doi:10.4230/dagrep.7.4 fatcat:oiz7wwh4hbhtvkg773gx65qukm

Ethical and Methodological Issues in Gang Ethnography in the Digital Age: Lessons from Four Studies in an Emerging Field [chapter]

Marta-Marika Urbanik, Robby Roks, Michelle Lyttle Storrod, James Densley
2020 Gangs in the Era of Internet and Social Media  
and the group, cooking and looking after the injured or ill," but also "being messengers, following potential victims, conducting surveillance and receiving payments for activities carried out by their  ...  had introduced the App Store-Apple's distribution platform for third-party applications.  ...  The field of gang research is rife with morally relevant questions, such as the debates surrounding the distribution of funds for prevention versus intervention, whether "street code" constitutes a form  ... 
doi:10.1007/978-3-030-47214-6_2 fatcat:r6q4zplcbnc63b46lgkx76iz3u

Usable, Secure Content-Based Encryption on the Web Usable, Secure Content-Based Encryption on the Web Usable, Secure Content-Based Encryption on the Web

Scott Ruoti, Scott Ruoti, Kent Seamons, Daniel Zappala, Mike Goodrich, David Wingate, Bryan Morse, Scott Ruoti
2016 unpublished
This state of affairs motivates the need for users to be able to encrypt their online data.  ...  Unfortunately, recent revelations have shown that not only is users' data at risk from hackers and malicious insiders, but also from government surveillance.  ...  We also recorded how Johnny sent the password he used to encrypt his email when using the Passwords system.  ... 

Photographic Mediation as a Mode of Production: Investigating the Agency of Commercial Institutions in Contemporary Vernacular Photography

Adam Bales
This dissertation argues that to understand what is at stake in contemporary vernacular photography, it is vital to account for the commercial imperatives that are invested in our photographic apparatus  ...  Through an examination of three central case studies - Kodak, Snapchat and Ditto Labs - this thesis aims to elucidate how the productive potential of vernacular photography is instrumentalized as a means  ...  For example, an advertisement for the Autographic Kodak (a system for recording notes on the film at the time of exposure), states 'Such records mean a great deal when baby has begun outgrowing baby ways  ... 
doi:10.25602/gold.00030436 fatcat:3vwigob36zfdtfm3ckazxbj7pm

Analog Game Studies, Volume 4

Aaron Trammell, Evan Torner, Emma Leigh Waldron, Shelly Jones
Analog Game Studies is a quarterly journal for the research and critique of analog games.  ...  Analog Game Studies was founded to reserve a space for scholarship on analog games in the wider field of game studies.  ...  blog, community forums, member profiles, and an in-browser web messenger).  ... 
doi:10.1184/r1/11929782 fatcat:vlvrdguswrhd5owihefmjoj2l4