نتایج جستجو برای: computer security

تعداد نتایج: 723551  

2013
Olga Ohrimenko Charalampos Papamanthou Bernardo Palazzi

Bernardo Palazzi Brown University and Italian National Institute of Statistics 21.

2006
A. W. Roscoe

We re-examine the needs of computer security in pervasive computing from first principles, specifically the problem of bootstrapping secure networks. We consider the case of systems that may have no shared secret information, and where there is no structure such as a PKI available. Nevertheless we propose a protocol which achieves a high degree of security based on a combination of humanmediate...

2010
Jie Wang Mario Strefler

The book gives an extensive overview of network security and the necessary cryptography. It covers standards and protocols in great detail, and can serve as a handy reference for people interested in this area. Due to the many exercises, it can also serve as one of the textbooks of an introductory course on network security. 1 What the book is about The book is intended as a textbook for a one-...

Journal: :Front. ICT 2014
Sandro Etalle Nicola Zannone

INTRODUCTION Few things in society and everyday life have changed in the last 10 years as much as the concept of security. From bank robberies to wars, what used to imply a great deal of violence is now silently happening on the Internet. Perhaps more strikingly, the very idea of privacy – a concept closely related to that of individual freedom – is undergoing such a profound revolution that pe...

2010
PETER G. NEUMANN

This paper considers the problem of attaining computer systems and applications programs that are both highly secure and highly reliable. It contrasts two current alternative approaches, one remedial, the other preventive. A remedial approach is outlined based on a classification of software security violations suggested by Bisbey, Carlstedt, and Hollingworth at lSI. This remedial analysis is t...

2014
David Wagner Sarah Palin Epic Hack

Instructions: Submit your solution by Thursday, February 11, 11:59pm, in the drop box labelled CS161 in 283 Soda Hall. Print your name, your class account name (e.g., cs161-xy), your TA's name, the discussion section time where you want to pick up your graded homework, and " HW1 " prominently on the first page. Staple all pages together. Your solutions must be legible and the solution to each p...

1993

This paper describes three courses in computer security, and offers come comments about their appropriateness, their advantages and their disadvantages.

Journal: :Informing Science: The International Journal of an Emerging Transdiscipline 2002

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید