Search Results

1 - 5 of 5 items :

  • "Human rights" x
  • Computer Sciences, other x
Clear All
Social Engineering Attacks on Government Opponents: Target Perspectives

:// [18] H. Choi, B. B. Zhu, and H. Lee, “Detecting malicious web links and identifying their attack types.” USENIX Conference on Web Application Development 2011, 2011. [Online]. Available: [19] S. Afroz and R. Greenstadt, “Phishzoo: Detecting phishing websites by looking at them,” in Fifth IEEE International Conference on Semantic Computing (ICSC) . IEEE, 2011, pp. 368–375. [20] “Reflecting on Ten Years of Practice: The Challenges of Digital Security Training for Human Rights

Open access
Toward Mending Two Nation-Scale Brokered Identification Systems

(6):644–654, 1976. [14] European Court of Human Rights. European Convention on Human Rights, Entry into force on June 2010. (As amended by Protocols No. 11 and 14; supplemented by Protocols Nos. 1,4,6,7 and 13.) PDF file (30 pages) – website. SHA256: . [15] Federal Chief Information Officers Council and Federal Enterprise Architecture. Federal Identity, Credential, and Access Management (FICAM) Roadmap and Implementation Guidance – Version 2.0, December 2, 2011. PDF file (478 pages) – website. SHA256: . [16] T. K. Frederiksen, T

Open access
ConsenSGX: Scaling Anonymous Communications Networks with Trusted Execution Environments

. . Accessed September 2018. [71] The Tor Project. Who Uses Tor? . Accessed September 2018. [72] United Nations. Universal Declaration of Human Rights (Article 12), 1948. . Accessed September 2018. [73] C. Wacek, H. Tan, K. S. Bauer, and M. Sherr. An Empirical Evaluation of Relay Selection in Tor. In 20th Network and Distributed System Security Symposium (NDSS) , 2013. [74] D. S. Wallach. A Survey of Peer

Open access
Analyzing the Great Firewall of China Over Space and Time

=cn&events=off. [41] Tokachu. The not-so-great firewall of China. 2600 Magazine, Winter 2006-2007. [42] TorStatus. Tor network status. http://torstatus.blutmagie. de. [43] G. Walton. China’s golden shield : corporations and the development of surveillance technology in the People’s Republic of China. International Centre for Human Rights and Democratic Development, 2001. [44] Y. A. Wang, C. Huang, J. Li, and K. W. Ross. Queen: Estimating packet loss rate between arbitrary internet hosts. In Passive and Active Network Measurement

Open access
Individual versus Organizational Computer Security and Privacy Concerns in Journalism

Times, February 2013. [Online]. Available: [6] -, “Wall Street Journal Announces That It, Too, Was Hacked by the Chinese,” The New York Times, January 2013. [Online]. Available: [7] Human Rights Watch, “With Liberty to Monitor All: How Large-Scale US Surveillance is Harming Journalism, Law, and American

Open access