Privacy vs. Security [[electronic resource] /] / by Sophie Stalla-Bourdillon, Joshua Phillips, Mark D. Ryan |
Autore | Stalla-Bourdillon Sophie |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | London : , : Springer London : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (124 p.) |
Disciplina | 323.448 |
Collana | SpringerBriefs in Cybersecurity |
Soggetto topico |
Computers
Law and legislation Mass media Law Computer security Computers and civilization Legal Aspects of Computing IT Law, Media Law, Intellectual Property Systems and Data Security Computers and Society |
ISBN | 1-4471-6530-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Foreword -- Privacy vs. Security… Are we done yet? -- A Future for Privacy. |
Record Nr. | UNINA-9910298974403321 |
Stalla-Bourdillon Sophie
![]() |
||
London : , : Springer London : , : Imprint : Springer, , 2014 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Privacy, intimacy, and isolation / Julie C. Inness |
Autore | INNESS, Julie C. |
Pubbl/distr/stampa | New York : Oxford University press, 1992 |
Descrizione fisica | IX, 157 p. ; 23 cm |
Disciplina | 323.448 |
Soggetto topico | Diritto alla riservatezza - Stati Uniti d'America |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-990002085630203316 |
INNESS, Julie C.
![]() |
||
New York : Oxford University press, 1992 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Privacy-Invading Technologies and Privacy by Design [[electronic resource] ] : Safeguarding Privacy, Liberty and Security in the 21st Century / / by Demetrius Klitou |
Autore | Klitou Demetrius |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | The Hague : , : T.M.C. Asser Press : , : Imprint : T.M.C. Asser Press, , 2014 |
Descrizione fisica | 1 online resource (343 p.) |
Disciplina | 323.448 |
Collana | Information Technology and Law Series |
Soggetto topico |
Mass media
Law Human rights Application software Computers Law and legislation IT Law, Media Law, Intellectual Property Human Rights Computer Appl. in Social and Behavioral Sciences Legal Aspects of Computing |
ISBN | 94-6265-026-8 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction -- Privacy, Liberty and Security -- Assessing the Adequacy of a Privacy Legal Framework -- Privacy-Invading Technologies -- Body Scanners: A Strip search by Other Means? Public Space CCTV Microphones and Loudspeakers: The Ears and Mouth of “Big Brother” -- Human-Implantable Microchips: Location-Awareness & the dawn of an “Internet of Persons” -- New Privacy Threats, Old Legal Approaches: Conclusion of The Value, Role and Challenges of Privacy by Design -- Conclusions and Policy Implications. |
Record Nr. | UNINA-9910484657203321 |
Klitou Demetrius
![]() |
||
The Hague : , : T.M.C. Asser Press : , : Imprint : T.M.C. Asser Press, , 2014 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Radical secrecy : the ends of transparency in datafied America / / Clare Birchall |
Autore | Birchall Clare |
Pubbl/distr/stampa | Minneapolis, Minnesota : , : University of Minnesota Press, , [2021] |
Descrizione fisica | 1 online resource (1 online resource) |
Disciplina | 323.448 |
Collana | Electronic Mediations |
Soggetto topico |
Secrecy - United States
Privacy - United States Freedom of information - United States |
ISBN | 1-4529-6492-0 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910794412803321 |
Birchall Clare
![]() |
||
Minneapolis, Minnesota : , : University of Minnesota Press, , [2021] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Radical secrecy : the ends of transparency in datafied America / / Clare Birchall |
Autore | Birchall Clare |
Pubbl/distr/stampa | Minneapolis, Minnesota : , : University of Minnesota Press, , [2021] |
Descrizione fisica | 1 online resource (1 online resource) |
Disciplina | 323.448 |
Collana | Electronic Mediations |
Soggetto topico |
Secrecy - United States
Privacy - United States Freedom of information - United States |
ISBN | 1-4529-6492-0 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910809551103321 |
Birchall Clare
![]() |
||
Minneapolis, Minnesota : , : University of Minnesota Press, , [2021] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Riserbo e inganno / Enrico Baffi |
Autore | BAFFI, Enrico |
Pubbl/distr/stampa | Milano : Giuffré, 2012 |
Descrizione fisica | 187 p. ; 24 cm |
Disciplina | 323.448 |
Collana | Studi di diritto civile |
Soggetto topico | Diritto alla riservatezza - Italia - Confronto [con gli] Stati Uniti d'America |
ISBN | 88-14-17666-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione |
ita
eng |
Record Nr. | UNISA-990005833680203316 |
BAFFI, Enrico
![]() |
||
Milano : Giuffré, 2012 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Secure Voice Processing Systems against Malicious Voice Attacks [[electronic resource] /] / by Kun Sun, Shu Wang |
Autore | Sun Kun |
Edizione | [1st ed. 2024.] |
Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 |
Descrizione fisica | 1 online resource (122 pages) |
Disciplina |
005.8
323.448 |
Altri autori (Persone) | WangShu |
Collana | SpringerBriefs in Computer Science |
Soggetto topico |
Data protection - Law and legislation
Biometric identification Privacy Biometrics |
ISBN | 3-031-44748-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 1 Introduction -- 1.1 Overview -- 1.2 Background -- 1.2.1 Audio Signal Processing -- 1.2.2 Voice Processing Systems -- 1.2.3 Attacks on Speaker Verification Systems -- 1.2.4 Attacks on Speech Recognition Systems -- 1.3 Book Structure -- References . . -- 2 Modulated Audio Replay Attack and Dual-Domain Defense -- 2.1 Introduction -- 2.2 Modulated Replay Attacks -- 2.2.1 Impacts of Replay Components -- 2.2.2 Attack Overview -- 2.2.3 Modulation Processor -- 2.2.4 Inverse Filter Estimation -- 2.2.5 Spectrum Processing -- 2.3 Countermeasure: Dual-domain Detection -- 2.3.1 Defense Overview -- 2.3.2 Time-domain Defense -- 2.3.3 Frequency-domain Defense -- 2.3.4 Security Analysis -- 2.4 Evaluation -- -- 2.4.1 Experiment Setup -- -- 2.4.2 Effectiveness of Modulated Replay Attacks -- 2.4.3 Effectiveness of Dual-Domain Detection -- 2.4.4 Robustness of Dual-Domain Detection -- 2.4.5 Overhead of Dual-Domain Detection -- 2.5 Conclusion -- -- Appendix 2.A: Mathematical Proof of Ringing Artifacts in Modulated Replay Audio -- -- Appendix 2.B: Parameters in Detection Methods -- Appendix 2.C: Inverse Filter Implementation -- Appendix 2.D: Classifiers in Time-Domain Defense -- References -- 3 Secure Voice Processing Systems for Driverless Vehicles -- 3.1 Introduction -- 3.2 Threat Model and Assumptions -- 3.3 System Design -- 3.3.1 System Overview -- 3.3.2 Detecting Multiple Speakers -- 3.3.3 Identifying Human Voice -- 3.3.4 Identifying Driver’s Voice -- 3.4 Experimental Results -- 3.4.1 Accuracy on Detecting Multiple Speakers -- 3.4.2 Accuracy on Detecting Human Voice -- 3.4.3 Accuracy on Detecting Driver’s Voice -- 3.4.4 System Robustness -- 3.4.5 Performance Overhead -- 3.5 Discussions -- 3.6 Conclusion -- References -- 4 Acoustic Compensation System against Adversarial Voice Recognition -- 4.1 Introduction -- 4.2 Threat Model -- 4.2.1 Spectrum Reduction Attack -- 4.2.2 Threat Hypothesis -- 4.3 System Design -- 4.3.1 Overview -- 4.3.2 Spectrum Compensation Module -- 4.3.3 Noise Addition Module -- 4.3.4 Adaptation Module -- 4.4 Evaluations -- 4.4.1 Experiment Setup -- 4.4.2 ACE Evaluation -- 4.4.3 Spectrum Compensation Module Evaluation -- 4.4.4 Noise Addition Module Evaluation -- 4.4.5 Adaptation Module Evaluation -- 4.4.6 Overhead -- 4.5 Residual Error Analysis -- 4.5.1 Types of ASR Inference Errors -- 4.5.2 Error Composition Analysis -- 4.6 Discussions -- 4.6.1 Multipath Effect and Audio Quality Improvement -- 4.6.2 Usability -- 4.6.3 Countering Attack Variants -- 4.6.4 Limitations -- 4.7 Conclusion -- Appendix 4.A: Echo Module -- Appendix 4.B: ACE Performance tested with CMU Sphinx -- Appendix 4.C: ACE Performance against Attack Variants -- References -- 5 Conclusion and Future Work -- 5.1 Conclusion -- 5.2 Future Work -- References. |
Record Nr. | UNINA-9910760295803321 |
Sun Kun
![]() |
||
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Sette anni di protezione dati In Italia : un bilancio e uno sguardo sul futuro : 2005-2012 / / Giuseppe Chiaravalloti, [and three others] ; Francesco Pizzetti (a cura di) |
Pubbl/distr/stampa | Turin, [Italy] : , : G. Giappichelli Editore, , 2012 |
Descrizione fisica | 1 online resource (241 pages) : illustrations |
Disciplina | 323.448 |
Soggetto topico | Privacy, Right of |
ISBN | 88-921-5086-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | ita |
Record Nr. | UNINA-9910795696103321 |
Turin, [Italy] : , : G. Giappichelli Editore, , 2012 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Sette anni di protezione dati In Italia : un bilancio e uno sguardo sul futuro : 2005-2012 / / Giuseppe Chiaravalloti, [and three others] ; Francesco Pizzetti (a cura di) |
Pubbl/distr/stampa | Turin, [Italy] : , : G. Giappichelli Editore, , 2012 |
Descrizione fisica | 1 online resource (241 pages) : illustrations |
Disciplina | 323.448 |
Soggetto topico | Privacy, Right of |
ISBN | 88-921-5086-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | ita |
Record Nr. | UNINA-9910809071803321 |
Turin, [Italy] : , : G. Giappichelli Editore, , 2012 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Situational Privacy and Self-Disclosure [[electronic resource] ] : Communication Processes in Online Environments / / by Philipp K. Masur |
Autore | Masur Philipp K |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (394 pages) |
Disciplina | 323.448 |
Soggetto topico |
Communication
Computer security Sociology Computers and civilization Communication Studies Privacy Media Research Computers and Society |
ISBN | 3-319-78884-1 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 1. Introduction -- 2. New Media Environments and Their Threats -- 3. Theories of Privacy -- 4. Theories of Self-Disclosure -- 5. Connecting Privacy and Self-Disclosure -- 6. Privacy and Self-Disclosure in the Age of Information -- 7. The Theory of Situational Privacy and Self-Disclosure -- 8. Applying the Theory to Smartphone-Based Communication -- 9. Methods -- 10. Results -- 11. Discussion -- 12. Overall Discussion -- 13. Overall Conclusion and Outlook -- A. Additional Tables and Figures to Chapter 9 -- B. Additional Tables and Figures to Chapter 10 -- References. |
Record Nr. | UNINA-9910337722103321 |
Masur Philipp K
![]() |
||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|