نتایج جستجو برای: security papers
تعداد نتایج: 265761 فیلتر نتایج به سال:
Computer security is an old problem which has lost none of its relevance — as is evidenced by the annual Security issue of ;login:. The systems research community has increased its attention to security issues in recent years, as can be seen by an increasing number of security-related papers published in the mainstream systems conferences SOSP, OSDI, and USENIX. However, the focus is primarily ...
Vision Papers Data Security – Challenges and Research Opportunities . . . . . . . . . . . . . . . 9 Elisa Bertino Research Challenges to Secure the Future Internet . . . . . . . . . . . . . . . . . . . 14 Jan Camenisch Security and Privacy of Data in a Cloud . . . . . . . . . . . . . . . . . . . . . . . . . . 18 Sushil Jajodia The Future of Information Security Research: Cryptology and Beyond ....
Security-mediated cryptography was first introduced by Boneh et al. in 2001. The main motivation behind security-mediated cryptography was the capability to allow instant revocation of a user's secret key by necessitating the cooperation of a security mediator in any given transaction. Subsequently in 2003, Boneh et al. showed how to convert a RSA-based security-mediated encryption scheme from ...
Most work building on the Stackelberg security games model assumes that the attacker can perfectly observe the defender’s randomized assignment of resources to targets. This assumption has been challenged by recent papers, which designed tailor-made algorithms that compute optimal defender strategies for security games with limited surveillance. We analytically demonstrate that in zero-sum secu...
While biological metaphors have a long history of use in computer security, they have been more successful in describing malicious software than in helping create better defenses. Immune system mechanisms, diversity, and homeostasis have helped inspire the development of promising computer security technologies. To fulfill the promise of biologically-inspired security, however, more work is nee...
Cyber-Physical Systems (CPSs) are characterized by integrating computation and physical processes. The theories and applications of CPSs face the enormous challenges that are (1) general workflow of cyber physical systems, (2) identifying the unique properties of cyber-physical systems and (3) discussing security mechanisms applicable to cyber physical systems. In particular, we analyze and we ...
In this note we refer to the security of the Py and TPy families, as discussed in several papers in recent years. We investigate the published attacks, and show that no attacks on TPy, TPypy and TPy6 have ever been published, whose complexities are within the bounds set by the security claims of these ciphers. Also, only a single attack on Py was published which may be considered within the sco...
This paper examines the information systems literature field from the viewpoint of knowledge security risk management. The review this paper reports was able to identify 7 papers presenting a knowledge security risk management model. The models represent different takes and perspectives on knowledge security risk management. The main finding is that business orientation in the risk management m...
This is one in a series of papers in the Retirement Security Project supported by a grant from The Pew Charitable Trusts.1 The Retirement Security Project is intended to bolster financial security for America's aging population by raising retirement savings and improving long-term care insurance products. It brings together pension researchers and health care experts to undertake nonpartisan re...
The Journal of Surveillance, Security and Safety is an international, peer-reviewed, open access journal which provides a forum for the publication papers addressing variety theoretical, methodological, epistemological, empirical practical issues concerns reflected in field information security, cyber machine learning, emerging technologies, their applications.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید