E-waste in the international context–A review of trade flows, regulations, hazards, waste management strategies and technologies for value recovery

I Ilankoon, Y Ghorbani, MN Chong, G Herath, T Moyo… - Waste management, 2018 - Elsevier
E-waste, or waste generated from electrical and electronic equipment, is considered as one
of the fastest-growing waste categories, growing at a rate of 3–5% per year in the world. In …

[PDF][PDF] A graduate course in applied cryptography

D Boneh, V Shoup - Draft 0.5, 2020 - dlib.hust.edu.vn
Cryptography is an indispensable tool used to protect information in computing systems. It is
used everywhere and by billions of people worldwide on a daily basis. It is used to protect …

[HTML][HTML] Digital forensics research: The next 10 years

SL Garfinkel - digital investigation, 2010 - Elsevier
Today's Golden Age of computer forensics is quickly coming to an end. Without a clear
strategy for enabling research efforts that build upon one another, forensic research will fall …

Engineering privacy

S Spiekermann, LF Cranor - IEEE Transactions on software …, 2008 - ieeexplore.ieee.org
In this paper we integrate insights from diverse islands of research on electronic privacy to
offer a holistic view of privacy engineering and a systematic structure for the discipline's …

[HTML][HTML] Bringing science to digital forensics with standardized forensic corpora

S Garfinkel, P Farrell, V Roussev, G Dinolt - digital investigation, 2009 - Elsevier
Progress in computer forensics research has been limited by the lack of a standardized data
sets—corpora—that are available for research purposes. We explain why corpora are …

Security and privacy issues in cloud computing

J Sen - Cloud technology: concepts, methodologies, tools, and …, 2015 - igi-global.com
Cloud computing transforms the way Information Technology (IT) is consumed and
managed, promising improved cost efficiencies, accelerated innovation, faster time-to …

Blockchain-based publicly verifiable data deletion scheme for cloud storage

C Yang, X Chen, Y **ang - Journal of Network and Computer Applications, 2018 - Elsevier
With the rapid development of cloud storage, more and more data owners store their data on
the remote cloud, that can reduce data owners' overhead because the cloud server …

[LIVRE][B] Usable security: History, themes, and challenges

S Garfinkel, HR Lipford - 2014 - books.google.com
There has been roughly 15 years of research into approaches for aligning research in
Human Computer Interaction with computer Security, more colloquially known as``usable …

Dark clouds on the horizon: Using cloud storage as attack vector and online slack space

M Mulazzani, S Schrittwieser, M Leithner… - 20th USENIX Security …, 2011 - usenix.org
During the past few years, a vast number of online file storage services have been
introduced. While several of these services provide basic functionality such as uploading …

Sok: Secure data deletion

J Reardon, D Basin, S Capkun - 2013 IEEE symposium on …, 2013 - ieeexplore.ieee.org
Secure data deletion is the task of deleting data irrecoverably from a physical medium. In the
digital world, data is not securely deleted by default; instead, many approaches add secure …