نتایج جستجو برای: security concern

تعداد نتایج: 277671  

2001
Ravi Sandhu

This issue of IEEE Internet Computing launches a new security “track” in the magazine. By means of this track, readers can look forward to at least one article on security in each issue. As one of the old-timers in the security business, this is an exciting development for me, as well as for the magazine and the security community at large. It is one of many signs that security is finally comin...

2017
Jun Ho Huh Saurabh Verma Swathi Sri V Rayala Rakesh B. Bobba Konstantin Beznosov Hyoungshick Kim

This paper reports on why people use, not use, or have stopped using mobile tap-and-pay in stores. The results of our online survey with 349 Apple Pay and 511 Android Pay participants suggest that the top reason for using mobile tap-andpay is usability. Surprisingly, for nonusers of Apple Pay, security was their biggest concern. A common security misconception we found among the nonusers (who s...

Journal: :محیط شناسی 0
عباس مصلّی نژاد

security building processes after world war ii, were under the influence of realistic thoughts. this was considered a reaction to idealistic and institutional approaches. critical school attempted to criticize classical and structural realism. new security theoreticians emphasize on extended subjects and diverse threats and believe it to be beyond the competition of countries. they believe that...

The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...

2007
Seung-Ju Jang

According to increasing use of internet, the security of network connection between web server and client is equal concern to both parties. Such risks of network security are eavesdropping, fraud, interception and so on. Therefore it is important to protect data from/to internet data. In special, there are two types of internet security, one is network security, the other is data security. Data...

2003
Gerður Jónsdóttir Leigh A. Davis Rose F. Gamble

Security has become a paramount concern due to dramatic advances of network technologies and a wide variety of new business opportunities. These advances have also brought the need for integration of computers systems to the surface, mainly for real-time, information sharing. As these systems are network-based, COTS products are predominantly used in these types of integration efforts. Since se...

Journal: :Computers & Security 2007
Lynette Drevin Hennie A. Kruger Tjaart Steyn

Security awareness is important to reduce human error, theft, fraud, and misuse of computer assets. A strong ICT security culture cannot develop and grow in a company without awareness programmes. This paper focuses on ICT security awareness and how to identify key areas of concern to address in ICT security awareness programmes by making use of the value-focused approach. The result of this ap...

2006
Lynette Drevin Hennie A. Kruger Tjaart Steyn

The aim of this paper is to introduce the approach of value-focused thinking when identifying information and communications technology (ICT) security awareness aspects. Security awareness is important to reduce human error, theft, fraud, and misuse of computer assets. A strong ICT security culture cannot develop and grow in a company without awareness programmes. How can personnel follow the r...

2008

Network security has become the primary concern of most enterprise and commercial network administrators. Whereas the greatest concern in the past was “physical security,” the almost-weekly release of new Internet-based viruses, worms, and attack tools has vastly increased the risk to the very fabric of business productivity. Network security was once viewed merely as a firewall between the net...

2015
Atul Chaturvedi Neelam Srivastava Varun Shukla

In 1976, Diffie and Hellman in their path breaking paper [5] proposed a two party key agreement protocol based on finite field. Diffie – Hellman Key Exchange Protocol [DH protocol] has unique importance in two party wireless communication scenarios. After this protocol several protocols have been proposed bases on DH protocol but the Man in the middle attack raises a serious security concern on...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید