You are here: Home
2974 items matching your search terms.
Filter the results.
Item type



















New items since



Sort by relevance · date (newest first) · alphabetically
Prime Security: The Mathematics of RSA Encryption
by elonnai hickok published Aug 29, 2011 last modified Sep 22, 2011 07:13 AM — filed under: ,
Based on simple properties of prime numbers, RSA encryption protects our money and digital identity. But how does it actually work? The Centre for Internet and Society invites you to a one-day workshop by Rohit Gupta on 9 September 2011.
Located in Internet Governance / Events
August 2011 Bulletin
by Prasad Krishna published Aug 24, 2011 last modified Aug 13, 2012 05:13 AM — filed under: , , , , , ,
Greetings from the Centre for Internet and Society! In this issue we are pleased to present you the latest updates about our research, upcoming events, and news and media coverage:
Located in About Us / Newsletters
IISc students boycott UID, don’t want Big Brother to keep watch
by Prasad Krishna published Aug 23, 2011 — filed under: ,
The programme doesn’t have statutory backing. It is still in parliament
Located in News & Media
In the Right Circle
by Prasad Krishna published Aug 23, 2011 — filed under: ,
I’ve been on Google Plus for a few weeks now. In the beginning, it felt like showing up early at a much-talked-up party. There was a small scatter of people, poking around, examining the place, making preliminary conversation with the few others they knew. Most of the talk was, unsurprisingly, about Google Plus.
Located in News & Media
Bye Bye email?
by Nishant Shah published Aug 23, 2011 — filed under:
Email might be the default method of communication for most of us, but could it be going the telegram way.
Located in Internet Governance
Blog Entry Whole Body Imaging and Privacy Concerns that Follow
by Srishti Goyal published Aug 22, 2011 last modified Sep 29, 2011 05:38 AM — filed under: ,
Law student at the National University of Juridical Sciences, and intern for Privacy India, Srishti Goyal compares, contrasts, and critiques the Whole Body Imaging practices found in the US, the UK, and Australia, and makes recommendations for an Indian regime.
Located in Internet Governance / Blog
Blog Entry IP Addresses and Expeditious Disclosure of Identity in India
by Prashant Iyengar published Aug 22, 2011 last modified Dec 14, 2012 10:20 AM — filed under: ,
In this research, Prashant Iyengar reviews the statutory mechanism regulating the retention and disclosure of IP addresses by Internet companies in India. Prashant provides a compilation of anecdotes on how law enforcement authorities in India have used IP address information to trace individuals responsible for particular crimes.
Located in Internet Governance
Cyber Crime & Privacy
by Merlin Oommen published Aug 22, 2011 last modified Sep 01, 2011 09:36 AM — filed under: ,
India is a growing area in the field of active Internet usage with 71 million Internet users.
Located in Internet Governance
Financial Inclusion and the UID
by elonnai hickok published Aug 22, 2011 last modified Aug 23, 2011 10:36 AM — filed under: ,
Since 2009, when Nandan Nilekani began to envision and implement the Unique Identification Project, the UID authority has promoted the UID/Aadhaar scheme as a tool of development for India - arguing that an identity will assist in bringing benefits to the poor, promote financial inclusion in India, and allow for economic and social development. In this blog entry I will focus on the challenges and possibilities of the UID number providing the residents of India a viable method of access to financial services across the country.
Located in Internet Governance
CCTV in Universities
by Merlin Oommen published Aug 10, 2011 last modified Sep 01, 2011 09:50 AM — filed under: ,
Basic Closed Circuit Television (CCTV) Infrastructure is used to observe movements from a central room, and consists of one or more video cameras that transmit video and audio images to a set of monitors or video recorders.
Located in Internet Governance / Blog / Privacy