scholarly journals Traffic authenticity analysis based on digital fingerprint data of network protocol implementations

Author(s):  
S.M. Ishkuvatov ◽  
I.I. Komarov
2013 ◽  
Vol 12 (1) ◽  
pp. 1-14 ◽  
Author(s):  
Susanne Krasmann ◽  
Sylvia Kuehne

In inquiring about the social acceptance of the digital fingerprint during our research, we discovered the crucial role the fictive plays in our interviewees’ experiencing and assessment of control and security technology. Social acceptance is thus a heterogeneous phenomenon, not only because it depends on the situational features of dealing with the technology, but also, notably, because facts and fiction intermingle, sometimes indistinctly, within the discourses on surveillance and security. Mistrust in the technology tends to feed on fictive imageries, while at the same time resting on an unwavering belief in the objectivity of fingerprint data, presumably a clearly decipherable and reliable form of forensic proof. Against this backdrop, the article seeks to investigate the fictive’s critical role in countering security technologies.


Author(s):  
Ze Zhang ◽  
Qingzhao Zhang ◽  
Brandon Nguyen ◽  
Sanjay Sri Vallabh Singapuram ◽  
Z. Morley Mao ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document