Security paper

Results: 6621



#Item
281

Cyber Safety: A Systems Thinking and Systems Theory Approach to Managing Cyber Security Risks Hamid Salim Working Paper CISL#

Add to Reading List

Source URL: ic3.mit.edu

Language: English - Date: 2015-03-02 04:17:03
    282

    Justifying Spam and E-mail Virus Security Investments: A Case Study Hemantha Herath1 and Tejaswini Herath2 Abstract: Our paper investigates the problem of justifying security investments concerning spam and email virus u

    Add to Reading List

    Source URL: www.econinfosec.org

    Language: English - Date: 2006-07-20 16:57:22
      283

      This paper was published in the Proceedings of the International Conference on Applied Cryptography and Information Security (ACIS) , 2006, pp. 327–337. Traceable Signature: Better Efficiency and Beyond⋆ He Ge1 and S

      Add to Reading List

      Source URL: nsl.cse.unt.edu

      Language: English - Date: 2012-01-12 18:49:58
        284

        Strategic Philanthropy for Cyber Security: An extended cost-benefit analysis framework to study cybersecurity Yiseul Cho Working Paper CISL# June 2012

        Add to Reading List

        Source URL: ic3.mit.edu

        Language: English - Date: 2015-03-02 04:16:01
          285

          Real Electronic Cash versus Academic Electronic Cash versus Paper Cash Yvo Desmedt BT Chair of Information Security University College London

          Add to Reading List

          Source URL: fc08.ifca.ai

          Language: English - Date: 2008-05-08 09:53:38
            286

            — Solution White Paper Breakthrough Security and Compliance Practices for the Digital Enterprise

            Add to Reading List

            Source URL: www.ciosummits.com

            Language: English - Date: 2015-09-22 18:29:07
              287Computing / Software / Network management / Scripting languages / Iptables / Computer network security / Event correlation / Firewall / Regular expression / Parsing / Complex event processing / Perl

              Paper Title (use style: paper title)

              Add to Reading List

              Source URL: ristov.github.io

              Language: English - Date: 2016-03-01 13:52:01
              288

              This paper was published in the Proceedings of the International Conference on Applied Cryptography and Information Security (ACIS) , 2006, pp. 327–337. Traceable Signature: Better Efficiency and Beyond⋆ He Ge1 and S

              Add to Reading List

              Source URL: www.uncg.edu

              Language: English - Date: 2009-10-01 23:36:57
                289Business / Automatic identification and data capture / Radio-frequency identification / Economy / Humancomputer interaction / Logistics / Supply chain management / Ubiquitous computing / Track and trace / EPCglobal Network / EPCIS / Authentication

                Building Radio frequency IDentification for the Global Environment White Paper RFID Tag Security Authors: Manfred Aigner (TU Graz), Trevor Burbridge (BT

                Add to Reading List

                Source URL: cocoa.ethz.ch

                Language: English - Date: 2013-05-23 01:58:05
                290Serge Vaudenay / Privacy / Cryptography / Financial cryptography / Economics of security / Matthew D. Green / Internet privacy

                Financial Cryptography and Data Security ’15 19th International Conference, January 26–30, 2015 InterContinental San Juan, Puerto Rico Paper Submission Deadline: September 15, 2014, 23:59 UTC (firm) Call for Papers F

                Add to Reading List

                Source URL: fc15.ifca.ai

                Language: English - Date: 2014-06-25 10:02:50
                UPDATE