نتایج جستجو برای: security papers
تعداد نتایج: 265761 فیلتر نتایج به سال:
Modern information systems are geographically distributed, parallel and network-based computing systems. The vulnerability of such computing systems greatly exceed the vulnerability of stand-alone computers. This is due, primarily, to the openness scale and heterogeneity of computer networks themselves. Accordingly, there are many ways to realize modern network attacks against distributed, para...
This special issue aims at showcasing the latest researches and technologies in the security domain. It comprises seven papers which are extended versions carefully selected from the 7th International Conference on Availability Reliability and Security (ARES’12)1. Since 2006, the AReS conference series have provided a platform for a full and detailed discussion of the research issues of dependa...
This Special Section will be included in the Journal issue of the IEICE Transactions of Fundamentals of Electronics, Communications and Computer Sciences (IEICE Trans. Fundamentals, for short), which will be published in January, 2019. The objective of the Special Section is to stimulate research in the area of cryptography and information security. You are strongly encouraged to submit origina...
Number of Papers published in peer-reviewed journals: Final Report: Science of Security Lablet Scalability and Usability Report Title The Carnegie Mellon University School of Computer Science (SCS) proposes to perform research to accelerate the achievement of security and assurance goals for larger-scale software-reliant systems. Software-reliant systems are in increasingly critical roles throu...
The second workshop on Security in Business Processes (SBP’13) was organised in conjunction with the 11th international conference on Business Process Management (BPM 2013). Over 20 participants attended the workshop to present and discuss 6 papers, the insights they offered and the issues they raised. During the half-day workshop, a number of important and emerging issues in this area were dis...
This literature review glances at the research that has been published in the area of chaos cryptography along with cryptanalysis of chaotic cryptosystem. It compares and contrasts the work done in different research papers towards the designing and cryptanalysis of chaotic cryptosystem for the validity of cryptosystems and improvement in encryption techniques. This review analyzes the role tha...
As the Internet slowly transitions towards IPv6, the routing protocols that are used to forward traffic across this global network must adapt to support this gradual transition. Two of the most frequently discussed interior dynamic routing protocols today are the IETF’s OSPF and Cisco’s EIGRP routing protocol. A wealth of papers have compared OSPF and EIGRP in terms of converge times and resour...
Research papers generally treat the problem of computer security as an intentional act to be solved by intellectually challenging methods such as encryption, descriptor-based systems, and program proving. Accidental and intentional acts are almost always referred to simultaneously; however, the safeguards are designed strictly to prevent intentional acts. It is generally thought that the same s...
Submission Guideline: All manuscripts and any supplementary material should be submitted through Elsevier Editorial System (EES). The authors must select “Communication Security” when they reach the “Article Type” step in the submission process. The EES website is located at http://ees.elsevier.com/comcom/. CALL FOR PAPERS Special Issue of Computer Communications on Information and Future Commu...
I continue the discussion initiated in [22] of whether or not computer-assisted proofs are a promising approach to preventing errors in reductionist security arguments. I examine some recent papers that describe automated security proofs for hashed ElGamal encryption, Boneh-Franklin identity-based encryption, and OAEP.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید