7 results
12 - Further Topics around Encryption
-
- Book:
- Introduction to Quantum Cryptography
- Published online:
- 10 October 2023
- Print publication:
- 14 September 2023, pp 284-301
-
- Chapter
- Export citation
7 - Security in PLC
- from Part III - Management, Security, and Further Applications
-
- Book:
- A Practical Guide to Power Line Communications
- Published online:
- 05 May 2022
- Print publication:
- 19 May 2022, pp 199-220
-
- Chapter
- Export citation
4 - China’s Data Security Policies Leading to the Cyber Security Law
- from Part I - Historical and Doctrinal Background
-
- Book:
- AI Development and the ‘Fuzzy Logic' of Chinese Cyber Security and Data Laws
- Published online:
- 16 December 2021
- Print publication:
- 16 December 2021, pp 80-93
-
- Chapter
- Export citation
Four - Inscribe and De-scribe/Cipher and De-cipher
- from Part I - Hidden Writing
-
-
- Book:
- The Hidden Language of Graphic Signs
- Published online:
- 23 August 2021
- Print publication:
- 19 August 2021, pp 80-99
-
- Chapter
- Export citation
2 - Internet of Things Security Failures
- from Part I - Privacy and Security in the Connected Era
-
- Book:
- A Commercial Law of Privacy and Security for the Internet of Things
- Published online:
- 17 August 2021
- Print publication:
- 29 July 2021, pp 59-79
-
- Chapter
- Export citation
4 - Reactive Surveillance
-
- Book:
- Smart Surveillance
- Published online:
- 02 August 2019
- Print publication:
- 22 August 2019, pp 84-101
-
- Chapter
- Export citation
Struggles for a global Internet constitution: protecting global communication structures against surveillance measures
-
- Journal:
- Global Constitutionalism / Volume 5 / Issue 2 / July 2016
- Published online by Cambridge University Press:
- 24 June 2016, pp. 145-172
-
- Article
- Export citation