-
CENTRES
Progammes & Centres
Location
29 results found
As quantum computing advances, the encryption shielding nuclear systems could collapse, forcing urgent upgrades to our global defence architecture
With online radicalisation surging, Australia’s 2025 counterterrorism strategy integrates AI-driven surveillance, strict encryption laws, and intell
तंत्रज्ञानात आमूलाग्र बदल होत असताना डार्क वेब अपराधां�
As technology continues to evolve, combating dark web crime requires ongoing adaptation and collaboration among stakeholders to safeguard digital secu
The only downside for India is whether states in the EU find it to be a sufficiently attractive actor with which to collaborate.
Tensions between government and industry over encryption, vulnerabilities and privacy are now compounded by a geo-technological rupture between the wo
The government has acknowledged the importance of protecting the integrity of data and the requirement of strong encryption standards.
repeated calls for weakening industry encryption standards raise the question of whether the means employed by governments to protect national and per
Encrypting communications enhances privacy and the security of information services. This, in turn, incentivises innovation in the ICT sector and contributes significantly to the growth of the internet economy. India’s (now withdrawn) Draft National Encryption Policy was single-minded in its approach. It sought only to prescribe standards that would enable law enforcement agencies to access encrypted data. There are, however, multifarious conc
On August 12, 2016 the Observer Research Foundation convened the first in a series of multistakeholder roundtables on encryption. This report is the outcome of the discussion of issues and proposal of solutions conducted at the roundtable. Being a complex, technical-legal question around access to data for law enforcement, encryption has long been a contested issue. Creating best-in-class regulation on encryption will require targeted interventio
This brief traces the history of the development and deployment of conventional submarines. It analyses their shortcomings and examines how these have been progressively addressed over the years, particularly in the realm of battlefield transparency. Greater stealth, long-range weapons and large weapon loads, when coupled with accurate positional information of targets, have improved the combat capability of modern conventional submarines, narrow
Digital financial services have benefits but pose privacy risks that harm consumers, merchants, markets, and nations alike. Some payments systems in India suffer from vulnerabilities because they were not prospectively designed on the basis of the ‘privacy by design’ principle. At the back-end, the centralised storage of data is risky. At the front-end, faulty capture devices enable data misuse. Across the middle mile, data is transmitted wit