How to Improve Security?
نویسندگان
چکیده
منابع مشابه
How to improve writing English articles
Introduction: One of the sections that readily captures the attention of readers of scientific articles is the title, but unfortunately, some authors, although being competent in writing the main content of the article, and considering the matters related to the writing style, mostly lack the skill required to couch the title in an attractive way. Methods: In this article, using three decades ...
متن کاملHow to improve security by contracting security outsourcing
There is an increasing number of articles and internet forums against outsourcing security and contracting Managed Security Services. In this type of articles and forums, outsourcing providers professionals are presented as a security threat to their customers.(An extreme example of this can be seen at Cio.com Forum (6)). The aim of this paper is to show customers the possible advantages of con...
متن کاملHow to improve English articles writing methods
Introduction: Today, English and its use as an international language is agreed upon by all, and a wealth of scientific articles written every day in the whole world is in English. The purpose of this study is to project some commonly used grammatical points that native speakers of Persian, unfortunately, do not follow or do not have adequate knowledge to use when writing in English, but this s...
متن کاملEarly Report: How to Improve Programmers' Expertise at App Security?
Apps present a significant security risk. Developer inexperience of security is a major contributor to this risk. Based on interviews with a dozen app security experts we identify that most app programmers simply do not care about security. Only by working on the factors influencing programmers’ motivation, and afterwards developing their whole system security skills, shall we shall we begin to...
متن کاملHow to Use RSA; or How to Improve the Efficiency of RSA Without Loosing its Security
It is striking to observe the progressive explosion of RSA key lengths. Although this trend clearly corresponds to a (legitimate) ever-increasing need for a guaranteed security level, this paper considers alternative, more efficient, secure implementations of RSA with respect to industrial constraints.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Queue
سال: 2011
ISSN: 1542-7730,1542-7749
DOI: 10.1145/2016036.2019582