Search

Your search keyword '"COMPUTER security research"' showing total 620 results

Search Constraints

Start Over You searched for: Descriptor "COMPUTER security research" Remove constraint Descriptor: "COMPUTER security research"
620 results on '"COMPUTER security research"'

Search Results

1. Engineering Trustworthy Systems: A Principled Approach to Cybersecurity.

2. Byzantine Agreement in Expected Polynomial Time.

3. Constant-Round Nonmalleable Commitments from Any One-Way Function.

4. Information Security Outsourcing with System Interdependency and Mandatory Security Requirement.

5. Understanding Nonmalicious Security Violations in the Workplace: A Composite Behavior Model.

6. No Free Lunch: Price Premium for Privacy Seal--Bearing Vendors.

7. Efficient and Secure Authenticated Key Exchange Using Weak Passwords.

8. Can Phishing Be Foiled?

9. Stopping the Leaks.

10. A Little Privacy, Please.

11. Keystroke dynamics on Android platform.

12. Assessing the Security Posture of Cloud Service Providers.

13. Wireless Network Security recommendations Using the Application for Security Evaluation.

14. An approach of security testing for third-party component based on state mutation.

15. A Novel NTT-Based Authentication Scheme for 10-GHz Quantum Key Distribution Systems.

16. Information Interoperability System Using Multi-agent with Security.

17. A Study on the Authentication and Security of Financial Settlement Using the Finger Vein Technology in Wireless Internet Environment.

18. Information Security Evaluation Using Multi-Attribute Threat Index.

19. SecureDom: secure mobile-sensitive information protection with domain separation.

20. A secure cloud storage system combining time-based one-time password and automatic blocker protocol.

21. Indifferentiability security of the fast wide pipe hash: Breaking the birthday barrier.

22. On Acceleration and Scalability of Number Theoretic Private Information Retrieval.

23. HEAP: Reliable Assessment of BGP Hijacking Attacks.

24. Quantum Private Query Protocol Based on Two Non-Orthogonal States.

25. SECURITY MEASURES FOR OPEN SOURCE WEBSITE PLATFORMS.

26. A GPU implementation of secret sharing scheme based on cellular automata.

27. An enhanced security framework for reliable Android operating system.

28. Introducing touchstroke: keystroke-based authentication system for smartphones.

29. Small target detection using morphology and modified Gaussian distance function.

30. Single authentication through in convergence space using collaborative smart cameras.

31. Optimisation-based collaborative determination of component trustworthiness in service compositions.

32. A histogram-based method for efficient detection of rewriting attacks in simple object access protocol messages.

33. Server-based code obfuscation scheme for APK tamper detection.

34. Secure and efficient data access control in cloud computing environment: A survey.

35. A survey of accountability in computer networks and distributed systems.

36. Reusing Hardware Performance Counters to Detect and Identify Kernel Control-Flow Modifying Rootkits.

37. Detection of Hardware Trojans in Third-Party Intellectual Property Using Untrusted Modules.

38. Demographic variables and risk factors in computer-crime: an empirical assessment.

39. Factors affecting the continuous use of cloud service: focused on security risks.

40. Control Flow Graph Based Multiclass Malware Detection Using Bi-normal Separation.

41. Selectively chosen ciphertext security in threshold public-key encryption.

42. Efficient and secure multi-functional searchable symmetric encryption schemes.

43. Cryptanalysis of a robust key agreement based on public key authentication.

44. A secure, service priority-based incentive scheme for delay tolerant networks.

45. Securing software defined wireless networks.

46. Prediction Using Propagation: From Flu Trends to Cybersecurity.

47. Critical Times for Organizations: What Should Be Done to Curb Workers’ Noncompliance With IS Security Policy Guidelines?

48. USER AUTHENTICATION TO A WEB SITE USING FINGERPRINTS.

49. IDENTITY-BASED CHRYPTOGRAPHY: FROM PROPOSALS TO EVERYDAY USE.

50. Security Incident Tracking in Virtualized Linux Environment.

Catalog

Books, media, physical & digital resources