Secure Data Transmissions for Iraqi National Identification Card Using LoRaWAN Protocol

Author(s):  
Nibras Raad ◽  
Taha Mohammed Hasan ◽  
Ahmed Chalak ◽  
Jumana Waleed
2009 ◽  
Vol 1 (2) ◽  
Author(s):  
Kevin Walby ◽  
Sean P Hier

The attacks of 11 September 2001 on Washington and New York continue to influence how governments manage im/migration, citizenship, and national security. One of the more contentious national security responses to the events of 9/11 in Canada has been the drive to introduce a biometric national identification card. In this paper, we argue that the drive for a Canadian national ID card is bound up in ideological processes which threaten to exacerbate, rather than to alleviate, state insecurities pertaining to risk, citizenship, and border (in) security. We maintain that ‘proof of status’ surveillance technologies, such as biometrically-encoded ID cards, lead to the ‘securitization’ of citizenship, and we conclude that ID cards threaten to destabilize the modern spatializations of sovereignty that they are purported to uphold under the guise of national security.


Author(s):  
Eric Kuada ◽  
Isaac Wiafe ◽  
Daniel Addo ◽  
Emmanuel Djaba

2017 ◽  
Vol 12 (1) ◽  
pp. 96-115 ◽  
Author(s):  
Hee-Jeong Lee

This article applies a late-Durkheimian theoretical framework to civil society as a sphere of solidarity in order to identify cultural codes and to explore their role in integrating or dividing members of South Korean civil society entering an information age coincident with processes of democratization. A policy debate relating to information, a debate over the Electronic National Identification Card, is used to show the co-existence of, and conflicts between, a ‘developmental code’ based on economic growth deriving from the authoritarian period of state-sponsored capitalism, and a later ‘democratic code’ based on human rights. This article argues that while the values of a ‘democratic code’ are becoming more dominant in the recent South Korean civil sphere, their validity is continuously challenged. The case also provides evidence that democratization and informatization can operate in tandem to establish dominance of the democratic code in public discourse in the South Korean civil sphere.


Asian Survey ◽  
1976 ◽  
Vol 16 (6) ◽  
pp. 510-524 ◽  
Author(s):  
John A. MacDougall

2017 ◽  
Vol 1 (1) ◽  
Author(s):  
Sherly Gina Supratman

AbstrakJaringan Komunikasi seperti Internet� merupakan jaringan yang tidak aman untuk mentransmisi data, seperti teks, audio,video dan citra digital. Salah satu cara untuk pengamanan data dapat dilakukan dengan menggunakan proses kriptografi dan �steganografi. Penggunaan ini dengan tujuan untuk merahasiakan pesan yang dikirim dan sekaligus menghindarkan pesan tersebut dari kecurigaan pihak lain yang tidak berkepentingan.Pesan yang digunakan dalam makalah ini adalah berupa text dengan menyisipkannya pada gambar. Pada proses kriptografi, pesan yang berupa text akan dienkrip dengan algoritma Hill Chiper, dan kemudian pesan yang telah dienkrip akan dilakukan proses steganografi pada citra digital� 8 bit dengan skala 0 � 255, dengan metode Least Significant Bit ( LSB ).�Kata kunci: Kriptografi, Hill Chiper, Steganografi, Least Significant Bit�AbstractCommunication Networks such as the Internet are unsafe networks for transmitting data, such as text, audio, video and digital imagery. One way to secure data can be done by using cryptography and steganography process. This use is for the purpose of concealing messages being transmitted and avoiding such messages from the suspicion by others who are not interested.The message used in this paper is text by inserting it in the image. In the cryptographic process, text messages will be encrypted with the Hill Chiper algorithm, and then the encrypted message will be steganographed on 8-bit digital images on a scale of 0-255, using the Least Significant Bit (LSB) method.�Keywords: Cryptography, Hill Chiper, Steganography, Least Significant Bit


Sign in / Sign up

Export Citation Format

Share Document