E-waste in the international context–A review of trade flows, regulations, hazards, waste management strategies and technologies for value recovery
E-waste, or waste generated from electrical and electronic equipment, is considered as one
of the fastest-growing waste categories, growing at a rate of 3–5% per year in the world. In …
of the fastest-growing waste categories, growing at a rate of 3–5% per year in the world. In …
[PDF][PDF] A graduate course in applied cryptography
Cryptography is an indispensable tool used to protect information in computing systems. It is
used everywhere and by billions of people worldwide on a daily basis. It is used to protect …
used everywhere and by billions of people worldwide on a daily basis. It is used to protect …
[HTML][HTML] Digital forensics research: The next 10 years
SL Garfinkel - digital investigation, 2010 - Elsevier
Today's Golden Age of computer forensics is quickly coming to an end. Without a clear
strategy for enabling research efforts that build upon one another, forensic research will fall …
strategy for enabling research efforts that build upon one another, forensic research will fall …
Engineering privacy
In this paper we integrate insights from diverse islands of research on electronic privacy to
offer a holistic view of privacy engineering and a systematic structure for the discipline's …
offer a holistic view of privacy engineering and a systematic structure for the discipline's …
[HTML][HTML] Bringing science to digital forensics with standardized forensic corpora
Progress in computer forensics research has been limited by the lack of a standardized data
sets—corpora—that are available for research purposes. We explain why corpora are …
sets—corpora—that are available for research purposes. We explain why corpora are …
Security and privacy issues in cloud computing
J Sen - Cloud technology: concepts, methodologies, tools, and …, 2015 - igi-global.com
Cloud computing transforms the way Information Technology (IT) is consumed and
managed, promising improved cost efficiencies, accelerated innovation, faster time-to …
managed, promising improved cost efficiencies, accelerated innovation, faster time-to …
Blockchain-based publicly verifiable data deletion scheme for cloud storage
With the rapid development of cloud storage, more and more data owners store their data on
the remote cloud, that can reduce data owners' overhead because the cloud server …
the remote cloud, that can reduce data owners' overhead because the cloud server …
[LIVRE][B] Usable security: History, themes, and challenges
S Garfinkel, HR Lipford - 2014 - books.google.com
There has been roughly 15 years of research into approaches for aligning research in
Human Computer Interaction with computer Security, more colloquially known as``usable …
Human Computer Interaction with computer Security, more colloquially known as``usable …
Dark clouds on the horizon: Using cloud storage as attack vector and online slack space
During the past few years, a vast number of online file storage services have been
introduced. While several of these services provide basic functionality such as uploading …
introduced. While several of these services provide basic functionality such as uploading …
Sok: Secure data deletion
Secure data deletion is the task of deleting data irrecoverably from a physical medium. In the
digital world, data is not securely deleted by default; instead, many approaches add secure …
digital world, data is not securely deleted by default; instead, many approaches add secure …