Skip to main content

Home/ Math 1111: Cryptography/ Group items tagged Public

Rss Feed Group items tagged

nate_clause

Beefing up public-key encryption | MIT News Office - 0 views

  •  
    Interesting article on how public-key encryption is used to keep information safe during financial transactions online. The article discusses weakness in basic public-key encryption schemes and how some of these schemes have been improved.
Derek Bruff

Hello Future Pastebin Readers - The Message - Medium - 0 views

  •  
    "Over time, all data approaches deleted, or public."
junqing-shi

How internet encryption works - 0 views

  •  
    This is a nice intro to public-key cryptography, and a bit of the math behind the "classic" public-key algorithms.
Justin Yeh

SIGSALY - NSA/CSS - 0 views

  •  
    The SIGSALY voice encryption system used during WWII by the Allies.
charlotteneuhoff

Military Embedded Systems - 0 views

  •  
    This resource provides access to articles, news, and blog posts regarding military embedded systems, often using cryptography. One article referenced the cryptography used to secure "Data at Rest" and the length at which this information should be held secure. Is it ethical to keep this information from the public when safety is no longer a concern? At what point should these well-kept secrets become accessible?
estrutt

Journal of Theoretical Physics and Cryptography - 0 views

  •  
    The Journal of Theoretical Physics and Cryptography is devoted to the rapid publication of fundamental research papers on all fields of theoretical physics and cryptography. All contributions shall be rigorously refereed and selecting on the basis of quality and originality of the work as well as the breadth of interest to readers.
jcs215

Unifying the Global Response to Cybercrime | APWG - 0 views

shared by jcs215 on 12 Nov 14 - Cached
  •  
    The APWG is the global industry, law enforcement, and government coalition focused on unifying the global response to electronic crime through development of data resources, data standards and model response protocols and systems for private and public sectors.
Ling Shi

Advanced Military Cryptography - 3 views

  •  
    A pre-WWII NSA document on advanced military cryptography which was declassified in 2014. This leads to the question of what impact disclosing these military secrets has on encryption and decryption of messages in future wars, and also why were these documents released in the first place.
Ling Shi

Cryptography in Network Security - 2 views

  •  
    This is the e-text of a book that discusses online network encryption and application. The chapters cover various encryption methods for the transfer of data online, as well as the application of wireless, email, IP network security
saraatsai

Video surveillance in public schools - 2 views

shared by saraatsai on 21 Oct 15 - No Cached
  •  
    Discusses the growth and legal rights of video surveillance in schools. This article contains multiple instances where court cases ruled that there was not a reasonable expectation of privacy.
  •  
    by Christy Hickman, staff counsel Members often ask whether a school district violates their right to privacy by using video camera surveillance or video recordings of evaluative observations. It is easy to understand the growth of video surveillance in schools, especially with the onslaught of on-campus criminal behavior and the horrendous episodes of violence that we hear of all too frequently.
Abbey Roberts

What Americans think about NSA surveillance, national security and privacy - 4 views

  •  
    This is the results of a Pew Research survey in May (of 2015) regarding Americans' opinions of the NSA, surveillance, national security, etc. This could be useful in the security vs. privacy paper, to look at the public opinion on these issues.
parker718

Social Networking Privacy: How to be Safe, Secure and Social - 2 views

  •  
    This website provides ample information on not only the ins and outs of public information but it also gives helpful suggestions on how to keep things private and why. One interesting suggestion discussed the risks of posting your birthday as identity thieves can predict your Social Security number based off of your place of birth and birthdate.
1 - 20 of 29 Next ›
Showing 20 items per page