نتایج جستجو برای: keywords notional security

تعداد نتایج: 2121554  

2010
Matt Bishop

Ten years ago, computer security was an arcane discipline that many academics did not see as an interesting or deep research area. Today, that perception has changed. Information assurance and computer security touch every aspect of our lives, and the interconnections with more traditional academic disciplines such as analysis of algorithms, operating systems, and network protocols have convinc...

2014
Salih Ergün Abdülkadir Öz

Terror is a modern war strategy which uses violence as a means of communication in order to achieve political objectives. In today’s security environment narrowing the propaganda field of terrorist organization is the primary goal for the security forces. In this sense, providing and maintaining public support is the most necessary ability for security units. Rather than enemy and threat-orient...

Journal: :CoRR 2014
Florian Kammüller

In this paper, we provide a formal framework for the security of distributed active objects. Active objects communicate asynchronously implementing method calls via futures. We base the formal framework on a security model that uses a semi-lattice to enable multi-lateral security crucial for distributed architectures. We further provide a security type system for the programming model ASPfun of...

2014
Ismeet Kaur Ajay Mittal Manvjeet Kaur

Security of a biometric system is of paramount importance considering increased commercial use for allowing access to sensitive areas. In this context protection of stored biometric templates is of particular interest as these templates are irrevocable once leaked. Fuzzy vault has emerged as a novel cryptographic construct for the protection of biometric templates. But like every other techniqu...

2016
Brandon Mauer William Stackpole Daryl Johnson

The growth of the security industry is sparking a significant interest in well-rounded security professionals. Regional and national competitions in the academic community have been developed to help identify qualified candidates to support this industry. A course has been built to allow students to improve their skills in this area. This paper describes the process used to administer events in...

2012
Gunjan Gupta Rama Chawla

With the explosive growth in the Internet, network security has become an inevitable concern for any organization whose internal private network is connected to the Internet. Network security is setup to guard against unauthorized access, alteration, or modification of information, and unauthorized denial of service. When a network is connected to the network that is vulnerable to potential int...

2002
Bryan Baker

Keywords: Capital asset pricing model (Capm) Capital asset pricing theory Finance theory Hedonic pricing Portfolio theory Residential rental real estate investment (RRREI) Security market line Systematic/unsystematic risk

Journal: :IJDSN 2012
Ana Lucila Sandoval Orozco Julián García Matesanz L. Javier García-Villalba José Duván Márquez Díaz Tai-Hoon Kim

In this paper, we discuss security issues and their current solutions in the mobile ad hoc network. Owe to the vulnerable nature of the mobile ad hoc network, there are numerous security threats that disturb the development of it. We first analyse the main vulnerabilities in the mobile ad hoc networks, which have made it much easier to suffer from attacks than the traditional wired network. The...

Journal: :IACR Cryptology ePrint Archive 2017
Tsunekazu Saito Keita Xagawa Takashi Yamakawa

We give a rst tight security reduction for a conversion from a weaklysecure public-key encryption scheme to an IND-CCA-secure key-encapsulation mechanism scheme in the quantum random oracle model. To the best of our knowledge, previous reductions are non-tight as the security levels of the obtained schemes are degraded to at most half or quater of the original security level (Boneh, Dagdelen, F...

2012
Andra Pradesh

The Wireless Sensor Network (WSN) increasingly becoming more practicable solution to many challenging applications. One of the major applications of the sensor networks is in military. So providing security is particularly challenging and its security mechanisms are also be the greatest concern to deploy sensor network such hostile unattended environments, monitoring real world applications. In...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید