Open Access. Powered by Scholars. Published by Universities.®
- Discipline
Articles 1 - 10 of 10
Full-Text Articles in Entire DC Network
What Is A Search? Two Conceptual Flaws In Fourth Amendment Doctine And Some Hints Of A Remedy, Sherry F. Colb
What Is A Search? Two Conceptual Flaws In Fourth Amendment Doctine And Some Hints Of A Remedy, Sherry F. Colb
Sherry Colb
No abstract provided.
Sunk Costs Of Consumer Search: Economic Rationality Of Satisficing Decision., Sergey V. Malakhov
Sunk Costs Of Consumer Search: Economic Rationality Of Satisficing Decision., Sergey V. Malakhov
Sergey Malakhov
Satisficing Decision Procedure And Optimal Consumption-Leisure Choice, Sergey V. Malakhov
Satisficing Decision Procedure And Optimal Consumption-Leisure Choice, Sergey V. Malakhov
Sergey Malakhov
Public Key Encryption With Keyword Search Secure Against Keyword Guessing Attacks Without Random Oracle, Liming Fang, Willy Susilo, Chunpeng Ge, Jiandong Wang
Public Key Encryption With Keyword Search Secure Against Keyword Guessing Attacks Without Random Oracle, Liming Fang, Willy Susilo, Chunpeng Ge, Jiandong Wang
Professor Willy Susilo
The notion of public key encryption with keyword search (PEKS) was put forth by Boneh et al. to enable a server to search from a collection of encrypted emails given a “trapdoor” (i.e., an encrypted keyword) provided by the receiver. The nice property in this scheme allows the server to search for a keyword, given the trapdoor. Hence, the verifier can merely use an untrusted server, which makes this notion very practical. Following Boneh et al.’s work, there have been subsequent works that have been proposed to enhance this notion. Two important notions include the so-called keyword guessing attack and …
Similarity-Based Search For Model Checking: A Pilot Study With Java Pathfinder, Elmin Ibrahimov, Jixing Wang, Zhiquan Zhou
Similarity-Based Search For Model Checking: A Pilot Study With Java Pathfinder, Elmin Ibrahimov, Jixing Wang, Zhiquan Zhou
Dr Zhiquan Zhou
When a model checker cannot explore the entire state space because of limited resources, model checking becomes a kind of testing with an attempt to find a failure (violation of properties) quickly. We consider two state sequences in model checking: (i) the sequence in which new states are generated, and (ii) the sequence in which the states generated in sequence (i) are checked for property violation. We observe that neighboring states in sequence (i) often have similarities in certain ways. Based on this observation we propose a search strategy, which generates sequence (ii) in such a way that similar states …
Constitutional Trespass, Laurent Sacharoff
Constitutional Trespass, Laurent Sacharoff
Laurent Sacharoff
Speech Engines, James Grimmelmann
Speech Engines, James Grimmelmann
James Grimmelmann
Academic and regulatory debates about Google are dominated by two opposing theories of what search engines are and how law should treat them. Some describe search engines as passive, neutral conduits for websites’ speech; others describe them as active, opinionated editors: speakers in their own right. The conduit and editor theories give dramatically different policy prescriptions in areas ranging from antitrust to copyright. But they both systematically discount search users’ agency, regarding users merely as passive audiences.
A better theory is that search engines are not primarily conduits or editors, but advisors. They help users achieve their diverse and individualized …
The "Not A Search" Game, John F. Stinneford
Our Records Panopticon And The American Bar Association Standards For Criminal Justice, Stephen E. Henderson
Our Records Panopticon And The American Bar Association Standards For Criminal Justice, Stephen E. Henderson
Stephen E Henderson
"Secrets are lies. Sharing is caring. Privacy is theft." So concludes the main character in Dave Egger’s novel The Circle, in which a single company that unites Google, Facebook, and Twitter – and on steroids – has the ambition not only to know, but also to share, all of the world's information. It is telling that a current dystopian novel features not the government in the first instance, but instead a private third party that, through no act of overt coercion, knows so much about us. This is indeed the greatest risk to privacy in our day, both the unprecedented …
Reforming The Grand Jury To Protect Privacy In Third Party Records, Stephen E. Henderson, Andrew E. Taslitz
Reforming The Grand Jury To Protect Privacy In Third Party Records, Stephen E. Henderson, Andrew E. Taslitz
Stephen E Henderson
In late 2014, two grand juries returned controversial no bill decisions in police killings, one in Ferguson, Missouri, and one in New York City. These outcomes have renewed calls for grand jury reform, and whatever one thinks of these particular processes and outcomes, such reform is long overdue. One logical source of reform to better respect privacy in records, which would have incidental benefits beyond this privacy focus, would be the newly enacted American Bar Association Standards for Criminal Justice on Law Enforcement Access to Third Party Records (LEATPR).
But LEATPR exempts from its requirements access to records via a …