Explore chapters and articles related to this topic
E-Mail Security and Privacy
Published in Steven F. Blanding, Enterprise Operations Management, 2020
PGP uses the RSA algorithm along with an enhanced idea encryption algorithm. Although the draft standards for PEM are not yet widely supported, they will probably gain acceptance as the language of the draft is clarified to remove ambiguity regarding the manner in which users are named and certified.
Towards a Conceptual Typology of Darknet Risks
Published in Journal of Computer Information Systems, 2023
Obi Ogbanufe, Jordan Wolfe, Fallon Baucum
It is not uncommon for buyers and sellers to communicate before and after a transaction either to inquire about product listings, shipping, or product quality. To maintain their anonymity, and due to fear of undercover law enforcement, vendors may ask potential buyers to contact them via encrypted communications.19 The most common method is using PGP encryption to encrypt messages and serve as authentication between participants.18,20 Researchers have found an increase in PGP use (nearly 90%) by vendors after the shutdown of darknet sites, suggesting that darknet participants fear detection by law enforcement.21 Even though darknet sites advise participants to use PGP encryption during communications to reduce detection from law enforcement, researchers have been surprised to find that only 21% of vendor listings in the sample examined included a PGP key or requested that their customers use other secure alternatives.13 They also found that participants described encrypted communication as a hassle and that even though sellers assured buyers that the customer information would be deleted after transacting, this was rarely the case.
A Scalable Gaussian Process for Large-Scale Periodic Data
Published in Technometrics, 2023
Yongxiang Li, Yuting Pu, Changming Cheng, Qian Xiao
To address the two challenges in classic PGP methods, we propose a novel circulant PGP (CPGP) model for large-scale periodic data collected at grids. The proposed CPGP divides the entire data into k segments and a remaining part if n is not multiples of k. It decomposes the log-likelihood of PGP into the sum of two computationally scalable composite log-likelihoods, which accelerates the computational complexity for calculating likelihoods from in PGP to in CPGP, where the segment length p is independent of and much smaller than the data size n. When p divides n, it can be further improved to . Note that CPGP has exactly the same likelihoods as PGP given the period, and thus it does not involve any approximations compared to PGP.
Behavioural cybersecurity: applications of personality psychology and computer science
Published in Ergonomics, 2020
While I agree that the text fills a useful niche, in contributing to the understanding of behavioural science to cybersecurity there are at least two domains that would seem to be support their objectives. The first is the domain of human–computer interaction (HCI) and the second is the domain of Cyberpsychology. Both domains have something to say regarding the application of behavioural science to the understanding and improvement of cyber security. One classic in the literature is the famous Why Johnny Can’t Encrypt Study (1999) written by Whitten and Tygar, which examines the difficulty in operating the pretty good privacy (PGP) software and how this might lead to the compromise of sensitive information. There has been previous work that is allied to the topics discussed here that might have been worthy of inclusion. Examples of this include Usable Security (2014) written by Garfinkel and Lipford. There are other researchers that have also shared this research such as Ross Anderson who wrote Security Engineering (2008) and conferences such as the Symposium On Usable Privacy and Security (SOUPS), The Security and Human Behaviour Conference and the Workshop on Economics and Information security. As well as researchers such as Bruce Schneier, who have also recognised and developed the importance of understanding the human factor in security.