- Table View
- List View
Advances in Cryptology – EUROCRYPT 2023: 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23–27, 2023, Proceedings, Part II (Lecture Notes in Computer Science #14005)
by Martijn Stam Carmit HazayThis five-volume set, LNCS 14004 - 14008 constitutes the refereed proceedings of the 42nd Annual International Conference on Theory and Applications of Cryptographic Techniques, Eurocrypt 2023, which was held in Lyon, France, in April 2023.The total of 109 full papers presented were carefully selected from 415 submissions. They are organized in topical sections as follows: Theoretical Foundations; Public Key Primitives with Advanced Functionalities; Classic Public Key Cryptography; Secure and Efficient Implementation, Cryptographic Engineering, and Real-World Cryptography; Symmetric Cryptology; and finally Multi-Party Computation and Zero-Knowledge.
Advances in Cryptology – EUROCRYPT 2024: 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26–30, 2024, Proceedings, Part I (Lecture Notes in Computer Science #14651)
by Gregor Leander Marc JoyeThe 7-volume set LNCS 14651 - 14657 conference volume constitutes the proceedings of the 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2024, held in in Zurich, Switzerland, in May 2024. The 105 papers included in these proceedings were carefully reviewed and selected from 500 submissions. They were organized in topical sections as follows: Part I: Awarded papers; symmetric cryptology; public key primitives with advanced functionalities; Part II: Public key primitives with advances functionalities; Part III: AI and blockchain; secure and efficient implementation, cryptographic engineering, and real-world cryptography; theoretical foundations; Part IV: Theoretical foundations; Part V: Multi-party computation and zero-knowledge; Part VI: Multi-party computation and zero-knowledge; classic public key cryptography, Part VII: Classic public key cryptography.
Advances in Cryptology – EUROCRYPT 2024: 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26–30, 2024, Proceedings, Part II (Lecture Notes in Computer Science #14652)
by Gregor Leander Marc JoyeThe 7-volume set LNCS 14651 - 14657 conference volume constitutes the proceedings of the 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2024, held in in Zurich, Switzerland, in May 2024. The 105 papers included in these proceedings were carefully reviewed and selected from 500 submissions. They were organized in topical sections as follows: Part I: Awarded papers; symmetric cryptology; public key primitives with advanced functionalities; Part II: Public key primitives with advances functionalities; Part III: AI and blockchain; secure and efficient implementation, cryptographic engineering, and real-world cryptography; theoretical foundations; Part IV: Theoretical foundations; Part V: Multi-party computation and zero-knowledge; Part VI: Multi-party computation and zero-knowledge; classic public key cryptography, Part VII: Classic public key cryptography.
Advances in Cryptology – EUROCRYPT 2024: 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26–30, 2024, Proceedings, Part III (Lecture Notes in Computer Science #14653)
by Gregor Leander Marc JoyeThe 7-volume set LNCS 14651 - 14657 conference volume constitutes the proceedings of the 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2024, held in in Zurich, Switzerland, in May 2024. The 105 papers included in these proceedings were carefully reviewed and selected from 500 submissions. They were organized in topical sections as follows: Part I: Awarded papers; symmetric cryptology; public key primitives with advanced functionalities; Part II: Public key primitives with advances functionalities; Part III: AI and blockchain; secure and efficient implementation, cryptographic engineering, and real-world cryptography; theoretical foundations; Part IV: Theoretical foundations; Part V: Multi-party computation and zero-knowledge; Part VI: Multi-party computation and zero-knowledge; classic public key cryptography, Part VII: Classic public key cryptography.
Advances in Cryptology – EUROCRYPT 2024: 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26–30, 2024, Proceedings, Part IV (Lecture Notes in Computer Science #14654)
by Gregor Leander Marc JoyeThe 7-volume set LNCS 14651 - 14657 conference volume constitutes the proceedings of the 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2024, held in in Zurich, Switzerland, in May 2024. The 105 papers included in these proceedings were carefully reviewed and selected from 500 submissions. They were organized in topical sections as follows: Part I: Awarded papers; symmetric cryptology; public key primitives with advanced functionalities; Part II: Public key primitives with advances functionalities; Part III: AI and blockchain; secure and efficient implementation, cryptographic engineering, and real-world cryptography; theoretical foundations; Part IV: Theoretical foundations; Part V: Multi-party computation and zero-knowledge; Part VI: Multi-party computation and zero-knowledge; classic public key cryptography, Part VII: Classic public key cryptography.
Advances in Cryptology – EUROCRYPT 2024: 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26–30, 2024, Proceedings, Part V (Lecture Notes in Computer Science #14655)
by Gregor Leander Marc JoyeThe 7-volume set LNCS 14651 - 14657 conference volume constitutes the proceedings of the 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2024, held in in Zurich, Switzerland, in May 2024. The 105 papers included in these proceedings were carefully reviewed and selected from 500 submissions. They were organized in topical sections as follows: Part I: Awarded papers; symmetric cryptology; public key primitives with advanced functionalities; Part II: Public key primitives with advances functionalities; Part III: AI and blockchain; secure and efficient implementation, cryptographic engineering, and real-world cryptography; theoretical foundations; Part IV: Theoretical foundations; Part V: Multi-party computation and zero-knowledge; Part VI: Multi-party computation and zero-knowledge; classic public key cryptography, Part VII: Classic public key cryptography.
Advances in Cryptology – EUROCRYPT 2024: 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26–30, 2024, Proceedings, Part VI (Lecture Notes in Computer Science #14656)
by Gregor Leander Marc JoyeThe 7-volume set LNCS 14651 - 14657 conference volume constitutes the proceedings of the 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2024, held in in Zurich, Switzerland, in May 2024. The 105 papers included in these proceedings were carefully reviewed and selected from 500 submissions. They were organized in topical sections as follows: Part I: Awarded papers; symmetric cryptology; public key primitives with advanced functionalities; Part II: Public key primitives with advances functionalities; Part III: AI and blockchain; secure and efficient implementation, cryptographic engineering, and real-world cryptography; theoretical foundations; Part IV: Theoretical foundations; Part V: Multi-party computation and zero-knowledge; Part VI: Multi-party computation and zero-knowledge; classic public key cryptography, Part VII: Classic public key cryptography.
Advances in Cryptology – EUROCRYPT 2024: 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26–30, 2024, Proceedings, Part VII (Lecture Notes in Computer Science #14657)
by Gregor Leander Marc JoyeThe 7-volume set LNCS 14651 - 14657 conference volume constitutes the proceedings of the 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2024, held in in Zurich, Switzerland, in May 2024. The 105 papers included in these proceedings were carefully reviewed and selected from 500 submissions. They were organized in topical sections as follows: Part I: Awarded papers; symmetric cryptology; public key primitives with advanced functionalities; Part II: Public key primitives with advances functionalities; Part III: AI and blockchain; secure and efficient implementation, cryptographic engineering, and real-world cryptography; theoretical foundations; Part IV: Theoretical foundations; Part V: Multi-party computation and zero-knowledge; Part VI: Multi-party computation and zero-knowledge; classic public key cryptography, Part VII: Classic public key cryptography.
Advances in Cryptology – EUROCRYPT 2025: 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques Madrid, Spain, May 4–8, 2025, Proceedings, Part I (Lecture Notes in Computer Science #15601)
by Serge Fehr Pierre-Alain FouqueThis eight-volume set, LNCS 15601-15608, constitutes the proceedings of the 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2025, held in Madrid, Spain, during May 4–8, 2025. The 123 papers included in these proceedings were carefully reviewed and selected from 602 submissions. They are organized in topical sections as follows:Part I: Secure Multiparty Computation IPart II: Public-Key Cryptography and Key-ExchangePart III: Advanced Cryptographic SchemesPart IV: (Non-)Interactive Proofs and Zero-KnowledgePart V: Secure Multiparty Computation IIPart VI: MPC II: Private Information Retrieval and Garbling; Algorithms and AttacksPart VII: Theoretical FoundationsPart VIII: Real-World Cryptography
Advances in Cryptology – EUROCRYPT 2025: 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Madrid, Spain, May 4–8, 2025, Proceedings, Part II (Lecture Notes in Computer Science #15602)
by Serge Fehr Pierre-Alain FouqueThis eight-volume set, LNCS 15601-15608, constitutes the proceedings of the 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2025, held in Madrid, Spain, during May 4–8, 2025. The 123 papers included in these proceedings were carefully reviewed and selected from 602 submissions. They are organized in topical sections as follows:Part I: Secure Multiparty Computation IPart II: Public-Key Cryptography and Key-ExchangePart III: Advanced Cryptographic SchemesPart IV: (Non-)Interactive Proofs and Zero-KnowledgePart V: Secure Multiparty Computation IIPart VI: MPC II: Private Information Retrieval and Garbling; Algorithms and AttacksPart VII: Theoretical FoundationsPart VIII: Real-World Cryptography
Advances in Cryptology – EUROCRYPT 2025: 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Madrid, Spain, May 4–8, 2025, Proceedings, Part III (Lecture Notes in Computer Science #15603)
by Serge Fehr Pierre-Alain FouqueThis eight-volume set, LNCS 15601-15608, constitutes the proceedings of the 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2025, held in Madrid, Spain, during May 4–8, 2025. The 123 papers included in these proceedings were carefully reviewed and selected from 602 submissions. They are organized in topical sections as follows:Part I: Secure Multiparty Computation IPart II: Public-Key Cryptography and Key-ExchangePart III: Advanced Cryptographic SchemesPart IV: (Non-)Interactive Proofs and Zero-KnowledgePart V: Secure Multiparty Computation IIPart VI: MPC II: Private Information Retrieval and Garbling; Algorithms and AttacksPart VII: Theoretical FoundationsPart VIII: Real-World Cryptography
Advances in Cryptology – EUROCRYPT 2025: 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Madrid, Spain, May 4–8, 2025, Proceedings, Part IV (Lecture Notes in Computer Science #15604)
by Serge Fehr Pierre-Alain FouqueThis eight-volume set, LNCS 15601-15608, constitutes the proceedings of the 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2025, held in Madrid, Spain, during May 4–8, 2025. The 123 papers included in these proceedings were carefully reviewed and selected from 602 submissions. They are organized in topical sections as follows:Part I: Secure Multiparty Computation IPart II: Public-Key Cryptography and Key-ExchangePart III: Advanced Cryptographic SchemesPart IV: (Non-)Interactive Proofs and Zero-KnowledgePart V: Secure Multiparty Computation IIPart VI: MPC II: Private Information Retrieval and Garbling; Algorithms and AttacksPart VII: Theoretical FoundationsPart VIII: Real-World Cryptography
Advances in Cryptology – EUROCRYPT 2025: 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Madrid, Spain, May 4–8, 2025, Proceedings, Part V (Lecture Notes in Computer Science #15605)
by Serge Fehr Pierre-Alain FouqueThis eight-volume set, LNCS 15601-15608, constitutes the proceedings of the 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2025, held in Madrid, Spain, during May 4–8, 2025. The 123 papers included in these proceedings were carefully reviewed and selected from 602 submissions. They are organized in topical sections as follows:Part I: Secure Multiparty Computation IPart II: Public-Key Cryptography and Key-ExchangePart III: Advanced Cryptographic SchemesPart IV: (Non-)Interactive Proofs and Zero-KnowledgePart V: Secure Multiparty Computation IIPart VI: MPC II: Private Information Retrieval and Garbling; Algorithms and AttacksPart VII: Theoretical FoundationsPart VIII: Real-World Cryptography
Advances in Cryptology – EUROCRYPT 2025: 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Madrid, Spain, May 4–8, 2025, Proceedings, Part VI (Lecture Notes in Computer Science #15606)
by Serge Fehr Pierre-Alain FouqueThis eight-volume set, LNCS 15601-15608, constitutes the proceedings of the 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2025, held in Madrid, Spain, during May 4–8, 2025. The 123 papers included in these proceedings were carefully reviewed and selected from 602 submissions. They are organized in topical sections as follows:Part I: Secure Multiparty Computation IPart II: Public-Key Cryptography and Key-ExchangePart III: Advanced Cryptographic SchemesPart IV: (Non-)Interactive Proofs and Zero-KnowledgePart V: Secure Multiparty Computation IIPart VI: MPC II: Private Information Retrieval and Garbling; Algorithms and AttacksPart VII: Theoretical FoundationsPart VIII: Real-World Cryptography
Advances in Cryptology – EUROCRYPT 2025: 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Madrid, Spain, May 4–8, 2025, Proceedings, Part VII (Lecture Notes in Computer Science #15607)
by Serge Fehr Pierre-Alain FouqueThis eight-volume set, LNCS 15601-15608, constitutes the proceedings of the 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2025, held in Madrid, Spain, during May 4–8, 2025. The 123 papers included in these proceedings were carefully reviewed and selected from 602 submissions. They are organized in topical sections as follows:Part I: Secure Multiparty Computation IPart II: Public-Key Cryptography and Key-ExchangePart III: Advanced Cryptographic SchemesPart IV: (Non-)Interactive Proofs and Zero-KnowledgePart V: Secure Multiparty Computation IIPart VI: MPC II: Private Information Retrieval and Garbling; Algorithms and AttacksPart VII: Theoretical FoundationsPart VIII: Real-World Cryptography
Advances in Cryptology – EUROCRYPT 2025: 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Madrid, Spain, May 4–8, 2025, Proceedings, Part VIII (Lecture Notes in Computer Science #15608)
by Serge Fehr Pierre-Alain FouqueThis eight-volume set, LNCS 15601-15608, constitutes the proceedings of the 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2025, held in Madrid, Spain, during May 4–8, 2025. The 123 papers included in these proceedings were carefully reviewed and selected from 602 submissions. They are organized in topical sections as follows:Part I: Secure Multiparty Computation IPart II: Public-Key Cryptography and Key-ExchangePart III: Advanced Cryptographic SchemesPart IV: (Non-)Interactive Proofs and Zero-KnowledgePart V: Secure Multiparty Computation IIPart VI: MPC II: Private Information Retrieval and Garbling; Algorithms and AttacksPart VII: Theoretical FoundationsPart VIII: Real-World Cryptography
Advances in Cultural Linguistics (Cultural Linguistics)
by Farzad SharifianThis groundbreaking collection represents the broad scope of cutting-edge research in Cultural Linguistics, a burgeoning field of interdisciplinary inquiry into the relationships between language and cultural cognition. The materials surveyed in its chapters demonstrate how cultural conceptualisations encoded in language relate to all aspects of human life - from emotion and embodiment to kinship, religion, marriage and politics, even the understanding of life and death. Cultural Linguistics draws on cognitive science, complexity science and distributed cognition, among other disciplines, to strengthen its theoretical and analytical base. The tools it has developed have worked toward insightful investigations into the cultural grounding of language in numerous applied domains, including World Englishes, cross-cultural/intercultural pragmatics, intercultural communication, Teaching English as an International Language (TEIL), and political discourse analysis.
Advances in Cultural Tourism Research: Proceedings of the International Conference on Cultural Tourism Advances, June 2023, Belgium (Advances in Digital and Cultural Tourism Management)
by Marinos Ioannides João Martins Bart NeutsThis open access book pertains to the "International Conference on Cultural Tourism Advances," held on June 27 and 28, 2023, at KU Leuven, Belgium. It focuses on advancing understanding of the sustainable development potential of cultural tourism by examining successful policy interventions, emerging cultural tourism trends, advancements in visitor management systems, new business and governance models, and the opportunities arising from ICT in the twenty-first century. This book presents recent key advances and their significant outcomes in the domain of European Cultural Tourism.
Advances in Culturally-Aware Intelligent Systems and in Cross-Cultural Psychological Studies (Intelligent Systems Reference Library #134)
by Colette FaucherThis book offers valuable new insights into the design of culturally-aware systems. In its first part, it is devoted to presenting selected Culturally-Aware Intelligent Systems devised in the field of Artificial Intelligence and its second part consists of two sub-parts that offer a source of inspiration for building modelizations of Culture and of its influence on the human mind and behavior, to be used in new Culturally-Aware Intelligent Systems. Those sub-parts present the results of experiments conducted in two fields that study Culture and its influence on the human mind's functions: Cultural Neuroscience and Cross-Cultural Psychology. In this era of globalization, people from different countries and cultures have the opportunity to interact directly or indirectly in a wide variety of contexts. Despite differences in their ways of thinking and reasoning, their behaviors, their values, lifestyles, customs and habits, languages, religions - in a word, their cultures - they must be able to collaborate on projects, to understand each other's views, to communicate in such a way that they don't offend each other, to anticipate the effects of their actions on others, and so on. As such, it is of primary importance to understand how culture affects people's mental activities, such as perception, interpretation, reasoning, emotion and behavior, in order to anticipate possible misunderstandings due to differences in handling the same situation, and to try and resolve them. Artificial Intelligence, and more specifically, the field of Intelligent Systems design, aims at building systems that mimic the behavior of human beings in order to complete tasks more efficiently than humans could by themselves. Consequently, in the last decade, experts and scholars in the field of Intelligent Systems have been increasingly tackling the notion of cultural awareness. A Culturally-Aware Intelligent System can be defined as a system where Culture-related or, more generally, socio-cultural information is modeled and used to design the human-machine interface, or to provide support with the task carried out by the system, be it reasoning, simulation or any other task involving cultural knowledge.
Advances in Culture Theory from Psychological Anthropology (Culture, Mind, and Society)
by Naomi QuinnThis edited volume provides a long-overdue synthesis of the current directions in culture theory and represents some of the very best in ongoing research. Here, culture theory is rendered as a jigsaw puzzle: the book identifies where current research fits together, the as yet missing pieces, and the straight edges that frame the bigger picture. These framing ideas are two: Roy D’Andrade’s concept of lifeworlds—adapted from phenomenology yet groundbreaking in its own right—and new thinking about internalization, a concept much used in anthropology but routinely left unpacked. At its heart, this book is an incisive, insightful collection of contributions which will surely guide and support those who seek to further the study of culture.
Advances in Cyber Security Analytics and Decision Systems (EAI/Springer Innovations in Communication and Computing)
by Atulya K. Nagar Shishir K. Shandilya Neal WagnerThis book contains research contributions from leading cyber security scholars from around the world. The authors provide comprehensive coverage of various cyber security topics, while highlighting recent trends. The book also contains a compendium of definitions and explanations of concepts, processes, acronyms, and comprehensive references on existing literature and research on cyber security and analytics, information sciences, decision systems, digital forensics, and related fields. As a whole, the book is a solid reference for dynamic and innovative research in the field, with a focus on design and development of future-ready cyber security measures. Topics include defenses against ransomware, phishing, malware, botnets, insider threats, and many others.
Advances in Cyber Security and Intelligent Analytics
by Jitendra Kumar Valentina Emilia Balas Abhishek Verma Vrijendra Singh Hari Mohan GaurWe live in a digital world, where we use digital tools and smart devices to communicate over the Internet. In turn, an enormous amount of data gets generated. The traditional computing architectures are inefficient in storing and managing this massive amount of data. Unfortunately, the data cannot be ignored as it helps businesses to make better decisions, solve problems, understand performance, improve processes, and understand customers. Therefore, we need modern systems capable of handling and managing data efficiently. In the past few decades, many distributed computing paradigms have emerged, and we have noticed a substantial growth in the applications based on such emerging paradigms. Some well-known emerging computing paradigms include cloud computing, fog computing, and edge computing, which have leveraged the increase in the volume of data being generated every second. However, the distributed computing paradigms face critical challenges, including network management and cyber security. We have witnessed the development of various networking models—IoT, SDN, and ICN—to support modern systems requirements. However, they are undergoing rapid changes and need special attention. The main issue faced by these paradigms is that traditional solutions cannot be directly applied to address the challenges. Therefore, there is a significant need to develop improved network management and cyber security solutions. To this end, this book highlights the challenges faced by emerging paradigms and presents the recent developments made to address the challenges. More specifically, it presents a detailed study on security issues in distributed computing environments and their possible solutions, followed by applications of medical IoT, deep learning, IoV, healthcare, etc.
Advances in Cyber Security: First International Conference, ACeS 2019, Penang, Malaysia, July 30 – August 1, 2019, Revised Selected Papers (Communications in Computer and Information Science #1132)
by Mohammed Anbar Nibras Abdullah Selvakumar ManickamThis book presents refereed proceedings of the First International Conference on Advances in Cyber Security, ACeS 2019, held in Penang, Malaysia, in July-August 2019.The 25 full papers and 1 short paper were carefully reviewed and selected from 87 submissions. The papers are organized in topical sections on internet of things, industry and blockchain, and cryptology; digital forensics and surveillance, botnet and malware, and DDoS and intrusion detection/prevention; ambient cloud and edge computing, wireless and cellular communication.
Advances in Cyber Security: Principles, Techniques, and Applications
by Kuan-Ching Li Xiaofeng Chen Willy SusiloThis book provides state-of-the-art coverage of the principles, techniques, and management of issues in cyber security, including threat attacks, privacy, signature and encryption schemes. One of the most important topics addressed concerns lightweight solutions for public key encryption in resource-constrained environments; the book highlights the latest developments in this area. Authentication is another central issue in cyber security. In this book, we address this aspect and sub-aspects ranging from cryptographic approaches to practical design issues, such as CAPTCHA. Privacy is another main topic that is discussed in detail, from techniques for enhancing privacy to pseudonymous schemes. Addressing key issues in the emerging field of cyber security, this book effectively bridges the gap between computer security and threat attacks, and showcases promising applications involving cryptography and security.
Advances in Cyber Security: Second International Conference, ACeS 2020, Penang, Malaysia, December 8-9, 2020, Revised Selected Papers (Communications in Computer and Information Science #1347)
by Mohammed Anbar Nibras Abdullah Selvakumar ManickamThis book presents refereed proceedings of the Second International Conference on Advances in Cyber Security, ACeS 2020, held in Penang, Malaysia, in September 2020. Due to the COVID-19 pandemic the conference was held online. The 46 full papers and 1 short paper were carefully reviewed and selected from 132 submissions. The papers are organized in topical sections on internet of things, industry 4.0 and blockchain, and cryptology; digital forensics and surveillance, botnet and malware, and intrusion detection/prevention; ambient cloud and edge computing, wireless and cellular communication; governance, social media, mobile and web, data privacy, data policy and fake news.