scholarly journals Burdens of Proof: Cryptographic Culture and Evidence Law in the Age of Electronic Documents

2013 ◽  
Vol 26 (2) ◽  
pp. 98-100
Author(s):  
Richard Fletcher
2016 ◽  
Author(s):  
Marc-Aurele Racicot

These days, is there a topic more significant and provocative than the protection of privacy in the private sector? The importance of this topic has been highlighted since the Canadian Parliament adopted the Personal Information Protection and Electronic Documents Act which came into full force on 1 January 2004 and which is scheduled for review in 2006. Although it seems that everywhere we turn, the word "privacy" and its companion PIPEDA are at centre stage, many say that this attention is unwarranted and a knee-jerk reaction to the information age where one can run but cannot hide. Like it or not, we are subject to the prying eyes of cameras in public places, the tracking and trailing of Internet activities, the selling of address lists and other such listings, and the synthesizing by marketers of frightful amounts of personal information that, when pulled together, reveals a lot about our personal life, our ancestry, our relationships, our interests and our spending habits.


2006 ◽  
Vol 26 (4) ◽  
pp. 805-822 ◽  
Author(s):  
M. Redmayne
Keyword(s):  

2013 ◽  
Vol 385-386 ◽  
pp. 1705-1707
Author(s):  
Tzer Long Chen ◽  
Yu Fang Chung ◽  
Jian Mao Hong ◽  
Jeng Hong Jhong ◽  
Chin Sheng Chen ◽  
...  

It is important to notice that the access control mechanism has been widely applied in various areas, such as on-line video systems, wireless network, and electronic documents. We propose an access control mechanism which is constructed based on two mathematical fundamentals: Lagrange interpolation and ElGamal algorithm. We conduct performance analysis to compare the efficiency of our proposed scheme with that of several related published schemes in both key generation phase and key derivation phase. Our new scheme is proven to be more efficient. It is shown, as expected, a more efficient scheme provides relatively less security and a more secure scheme is relatively less efficient for private keys of the same size.


Sign in / Sign up

Export Citation Format

Share Document