Skip to main content

Home/ Math 1111: Cryptography/ Group items tagged Human

Rss Feed Group items tagged

Derek Bruff

Beneblog: Technology Meets Society: Benetech's Human Rights Spin-off - 0 views

  •  
    During one of our classes, we briefly discussed the use of cryptography to protect eyewitness and victim information during the investigation of human rights violations. The individual I mentioned that day was Patrick Ball, who now will lead a new organization focused on "the data-driven and scientific side of analyzing human rights violations around the world."
hamzapatel123

The Human Genome Is In Stalemate in the War Against Itself - 0 views

  •  
    I thought this article was very well written because at first it has a nice captivating introduction and title. The author goes on to explain the concepts in the most technical manner, but then he takes a step back and goes back to the reader's level in order to facilitate the reader's understanding if he or she does not have much knowledge on the topic. All in all, the article introduced a very interesting discovery about human evolution.
rmusicant

Journey Into Cryptography - 1 views

  •  
    How have humans protected their secret messages through history? What has changed today?
Derek Bruff

Security In A Box | Tools and tactics for your digital security - 2 views

shared by Derek Bruff on 12 Nov 14 - No Cached
  •  
    Security in-a-box is a collection of guides and free tools to secure your computer, protect your information or maintain the privacy of your Internet communication. It was created to meet the digital security and privacy needs of advocates and human rights defenders.
estrutt

Walk the Walk: Gait Recognition Technology Could Identify Humans at a Distance - 1 views

  •  
    Interesting how this article talks about the gait analysis being used for catching terrorists, while in Little Brother, it was used to keep track of the high school students. The technology is not quite ready to be used, but seems to be much more reliable than the gait trackers in the book.
  •  
    Georgia Tech Research Institute is making gait recognition technology a reality. "The ultimate goal is to detect, classify and identify humans at distances up to 500 feet away under day or night, all-weather conditions. Such capabilities will enhance the protection of U.S. forces and facilities from terrorist attacks."
Derek Bruff

PETA sues to give monkey the copyright of selfie photos | abc7.com - 1 views

  •  
    The US Copyright Office has issued a statement saying that it would only issue copyrights to humans. PETA objects to this, having just filed a suit to grant that macaque monkey the copyright for the selfies it took back in 2011. The struggle is real.
aconn55

Visual Cryptography - 0 views

  •  
    What is Visual Cryptography Visual Cryptography is a special encryption technique to hide information in images in such a way that it can be decrypted by the human vision if the correct key image is used. The technique was proposed by Naor and Shamir in 1994. Visual Cryptography uses two transparent images.
1 - 9 of 9
Showing 20 items per page