Avancerad sökning

Hittade 5 avhandlingar som matchar ovanstående sökkriterier.

  1. 1. För din och andras säkerhet : Konstitutionella proportionalitetskrav och Säkerhetspolisens preventiva tvångsmedel

    Författare :Markus Naarttijärvi; Per Bergling; Patrik Södergren; Petter Asp; Umeå universitet; []
    Nyckelord :SAMHÄLLSVETENSKAP; SOCIAL SCIENCES; law; constitutional law; proportionality; national security; intelligence; lawful interception; signals intelligence; surveillance; security; security service; Sweden; privacy; private life; ECHR; European convention; human rights; technology; technology neutrality; prevention; constitutional rights; juridik; rättsvetenskap; proportionalitet; konstitutionell rätt; rikets säkerhet; nationell säkerhet; säkerhet; underrättelseverksamhet; signalspaning; avlyssning; övervakning; internet; säkerhetspolisen; personlig integritet; privatliv; Europakonventionen; mänskliga rättigheter; teknikneutralitet; prevention; konstitutionella rättigheter; Law; juridik;

    Sammanfattning : This doctoral thesis analyzes the balancing and proportionality analyses performed by Swedish legislators over time in the creation of legislation allowing for the interception of communica- tions data and metadata by the Swedish Security Service for intelligence purposes. By examining the concept of proportionality within the field of constitutional law, a framework for performing proportionality tests is identified. LÄS MER

  2. 2. On Secure and Sequential Source Coding

    Författare :Hamid Ghourchian; Mikael Skoglund; Tobias J. Oechtering; Michèle Wigger; KTH; []
    Nyckelord :TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Electrical Engineering; Elektro- och systemteknik;

    Sammanfattning : Secure source coding is an important research area in recent years as it deals with the problem of transmitting sensitive information over insecure channels while protecting it from unauthorized access. This is particularly relevant in the context of modern communication systems where the data transmitted is often sensitive in nature and the threat of eavesdropping or data breaches is high. LÄS MER

  3. 3. Performance Guarantees for Physical Layer Authentication in Mission-Critical Communications

    Författare :Henrik Forssell; Ragnar Thobaben; Stefano Tomasin; KTH; []
    Nyckelord :TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Physical layer authentication; mission-critical communica- tions; worst-case performance; queueing delay performance; stochastic net- work calculus; optimal attack strategies.; Electrical Engineering; Elektro- och systemteknik;

    Sammanfattning : As the application areas for wireless communications are expanding, we also see new security vulnerabilities arise due to the open nature of the wire- less medium. One particularly challenging problem is how to guarantee the security of emerging mission-critical communications, e.g. LÄS MER

  4. 4. Väktare, ombud, kritiker : Sverige i amerikanskt säkerhetstänkande, 1961-1968

    Författare :Jerker Widén; Försvarshögskolan; []
    Nyckelord :Krigsvetenskap; Krigsvetenskap;

    Sammanfattning : Denna bok utgör den noggrannaste och mest djupgående beskrivningen hittills av USA:s syn på ­Sverige under det turbulenta 1960-talet. Få har grävt så djupt i amerikanska arkiv om Sveriges ­säkerhetspolitiska roll som författaren. I boken redovisas ett av de viktigaste fynd som gjorts i amerikanska arkiv. LÄS MER

  5. 5. Privacy Mechanism Design Through the Lens of Information Theory : With Applications to Compression, Caching, and Semantic Communication

    Författare :Amirreza Zamani; Mikael Skoglund; Tobias J. Oechtering; Parastoo Sadeghi; KTH; []
    Nyckelord :TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Privacy mechanism design; Leakage matrix; Strong privacy criterion; KL-divergence; Local approximation; Euclidean information geometry; Privacy-utility trade-off; χ2-privacy criterion; l1-privacy criterion; Common information; Functional representation lemma; Two-part construction coding; Design av sekretessmekanism; Läckagematris; Stark sekretesskriterium; KL-divergens; Lokal approximation; Euklidisk informationsgeometri; Sekretess-nyttoavvägning; χ2-sekretesskriterium; l1-sekretesskriterium; Gemensam information; Lemma för funktionell representation; Kodning med tvådelad konstruktion.; Electrical Engineering; Elektro- och systemteknik;

    Sammanfattning : Privacy mechanism design is an important research area and is receiving increased attention in recent years. This field focuses on addressing the challenge of revealing general data that might have correlations with sensitive information, all while protecting this sensitive information against unauthorized access. LÄS MER