Works matching DE "COMPUTER security software"
Results: 291
Spoofing a Hardware Security Module.
- Published in:
- ISSA Journal, 2019, v. 17, n. 1, p. 24
- By:
- Publication type:
- Article
Spoofing a Hardware Security Module.
- Published in:
- ISSA Journal, 2018, v. 16, n. 6, p. 33
- By:
- Publication type:
- Article
THE NEW PARADIGM: WHEN AUTHENTICATION BECOMES INVISIBLE TO THE USER.
- Published in:
- Intel Technology Journal, 2014, v. 18, n. 4, p. 198
- By:
- Publication type:
- Article
PROTECTING SENSOR DATA FROM MALWARE ATTACKS.
- Published in:
- Intel Technology Journal, 2014, v. 18, n. 4, p. 178
- By:
- Publication type:
- Article
TRUSTED EXECUTION ENVIRONMENT FOR PRIVACY PRESERVING BIOMETRIC AUTHENTICATION.
- Published in:
- Intel Technology Journal, 2014, v. 18, n. 4, p. 162
- By:
- Publication type:
- Article
SECURITY ANALYSIS OF MOBILE TWO-FACTOR AUTHENTICATION SCHEMES.
- Published in:
- Intel Technology Journal, 2014, v. 18, n. 4, p. 138
- By:
- Publication type:
- Article
HETEROGENEOUS FACE RECOGNITION: AN EMERGING TOPIC IN BIOMETRICS.
- Published in:
- Intel Technology Journal, 2014, v. 18, n. 4, p. 80
- By:
- Publication type:
- Article
ON DESIGNING SWIR TO VISIBLE FACE MATCHING ALGORITHMS.
- Published in:
- Intel Technology Journal, 2014, v. 18, n. 4, p. 98
- By:
- Publication type:
- Article
A SURVEY OF BIOMETRICS FOR WEARABLE DEVICES.
- Published in:
- Intel Technology Journal, 2014, v. 18, n. 4, p. 46
- By:
- Publication type:
- Article
ENHANCED PRIVACY ID: A REMOTE ANONYMOUS ATTESTATION SCHEME FOR HARDWARE DEVICES.
- Published in:
- Intel Technology Journal, 2009, v. 13, n. 2, p. 96
- By:
- Publication type:
- Article
RECENT CONTRIBUTIONS TO CRYPTOGRAPHIC HASH FUNCTIONS.
- Published in:
- Intel Technology Journal, 2009, v. 13, n. 2, p. 80
- By:
- Publication type:
- Article
Model of Threats to Computer Network Software.
- Published in:
- Symmetry (20738994), 2019, v. 11, n. 12, p. 1506, doi. 10.3390/sym11121506
- By:
- Publication type:
- Article
Enabling Trust and Privacy for Future Integrated RFID System.
- Published in:
- Journal of Information Assurance & Security, 2013, v. 8, n. 3, p. 200
- By:
- Publication type:
- Article
AES: Current Security and Efficiency Analysis of its Alternatives.
- Published in:
- Journal of Information Assurance & Security, 2012, v. 7, n. 1, p. 52
- By:
- Publication type:
- Article
On the Capacity of Fingerprinting Codes against AND, Averaging, and Related Attacks.
- Published in:
- Journal of Information Assurance & Security, 2012, v. 7, n. 1, p. 41
- By:
- Publication type:
- Article
User Data Confidentiality in an Orchestration of Web Services.
- Published in:
- Journal of Information Assurance & Security, 2012, v. 7, n. 1, p. 32
- By:
- Publication type:
- Article
Data Loss, Encryption & Backups.
- Published in:
- Continuity Insights, 2011, v. 9, n. 7, p. 12
- Publication type:
- Article
A Shortest-Paths Heuristic for Statistical Data Protection in Positive Tables.
- Published in:
- INFORMS Journal on Computing, 2007, v. 19, n. 4, p. 520, doi. 10.1287/ijoc.1060.0185
- By:
- Publication type:
- Article
A Chaos-Based Approach for Correcting the Security Level of a Block Cipher Algorithm.
- Published in:
- International Review on Computers & Software, 2016, v. 11, n. 2, p. 92, doi. 10.15866/irecos.v11i2.8356
- By:
- Publication type:
- Article
Waters Adds Key Enhancements to MassLynx Software for Mass Spec.
- Published in:
- 2003
- Publication type:
- Product Review
A descriptive study of Microsoft's threat modeling technique.
- Published in:
- Requirements Engineering, 2015, v. 20, n. 2, p. 163, doi. 10.1007/s00766-013-0195-2
- By:
- Publication type:
- Article
SPYWARE VS. SPYWARE: SOFTWARE CONFLICTS AND USER AUTONOMY.
- Published in:
- Ohio State Technology Law Journal, 2020, v. 16, n. 1, p. 25
- By:
- Publication type:
- Article
Investigating Installers of Security Software in 20 Countries: Individual- and Country-Level Differences.
- Published in:
- Human Behavior & Emerging Technologies, 2022, p. 1, doi. 10.1155/2022/1230344
- By:
- Publication type:
- Article
Stylometric Identification in Electronic Markets: Scalability and Robustness.
- Published in:
- Journal of Management Information Systems, 2008, v. 25, n. 1, p. 49, doi. 10.2753/MIS0742-1222250103
- By:
- Publication type:
- Article
Systematically handicapped? Social research in the data protection framework.
- Published in:
- Information & Communications Technology Law, 2011, v. 20, n. 2, p. 83, doi. 10.1080/13600834.2011.578925
- By:
- Publication type:
- Article
technology TOOLS.
- Published in:
- 2005
- Publication type:
- Product Review
Software Patches More Vulnerable to Hackers.
- Published in:
- Financial Executive, 2005, v. 21, n. 2, p. 10
- By:
- Publication type:
- Article
when insiders GO outside the lines.
- Published in:
- Financial Executive, 2004, v. 20, n. 9, p. 36
- By:
- Publication type:
- Article
Making Sensible Investments in Security.
- Published in:
- Financial Executive, 2003, v. 19, n. 9, p. 46
- By:
- Publication type:
- Article
A PASSWORD TO COMPUTER SECURITY.
- Published in:
- Financial Executive, 1992, v. 8, n. 4, p. 34
- By:
- Publication type:
- Article
A CCA2 secure Code based encryption scheme in the Standard Model.
- Published in:
- GSTF Journal on Computing, 2012, v. 2, n. 1, p. 158
- By:
- Publication type:
- Article
Leakage-Free ID-Based Signature.
- Published in:
- Computer Journal, 2015, v. 58, n. 4, p. 750, doi. 10.1093/comjnl/bxt116
- By:
- Publication type:
- Article
Visual Cryptography Schemes with Reversing.
- Published in:
- Computer Journal, 2008, v. 51, n. 6, p. 710, doi. 10.1093/comjnl/bxm118
- By:
- Publication type:
- Article
Probabilistic Visual Cryptography Schemes.
- Published in:
- Computer Journal, 2006, v. 49, n. 1, p. 97, doi. 10.1093/comjnl/bxh152
- By:
- Publication type:
- Article
Formal Methods for Assuring Security of Protocols.
- Published in:
- Computer Journal, 2002, v. 45, n. 1, p. 46, doi. 10.1093/comjnl/45.1.46
- By:
- Publication type:
- Article
RSE-PoW: a Role Symmetric Encryption PoW Scheme with Authorized Deduplication for Multimedia Data.
- Published in:
- Mobile Networks & Applications, 2018, v. 23, n. 3, p. 650, doi. 10.1007/s11036-017-0975-x
- By:
- Publication type:
- Article
Monitoring Smartphones for Anomaly Detection.
- Published in:
- Mobile Networks & Applications, 2009, v. 14, n. 1, p. 92, doi. 10.1007/s11036-008-0113-x
- By:
- Publication type:
- Article
New security notions and relations for public-key encryption.
- Published in:
- Journal of Mathematical Cryptology, 2012, v. 6, n. 3/4, p. 183, doi. 10.1515/jmc-2010-0099
- By:
- Publication type:
- Article
The discrete logarithm problem modulo one: cryptanalysing the Ariffin-Abu cryptosystem.
- Published in:
- Journal of Mathematical Cryptology, 2010, v. 4, n. 2, p. 193, doi. 10.1515/JMC.2010.008
- By:
- Publication type:
- Article
Mean-set attack: cryptanalysis of Sibert et al. authentication protocol.
- Published in:
- Journal of Mathematical Cryptology, 2010, v. 4, n. 2, p. 149, doi. 10.1515/JMC.2010.006
- By:
- Publication type:
- Article
An efficient identification protocol secure against concurrent-reset attacks.
- Published in:
- Journal of Mathematical Cryptology, 2009, v. 3, n. 4, p. 339, doi. 10.1515/JMC.2009.021
- By:
- Publication type:
- Article
On a conjecture for balanced symmetric Boolean functions.
- Published in:
- Journal of Mathematical Cryptology, 2009, v. 3, n. 4, p. 273, doi. 10.1515/JMC.2009.017
- By:
- Publication type:
- Article
Cryptanalysis of the MST<sub>3</sub> public key cryptosystem.
- Published in:
- Journal of Mathematical Cryptology, 2009, v. 3, n. 4, p. 321, doi. 10.1515/JMC.2009.020
- By:
- Publication type:
- Article
One-round secure comparison of integers.
- Published in:
- Journal of Mathematical Cryptology, 2009, v. 3, n. 1, p. 37, doi. 10.1515/JMC.2009.003
- By:
- Publication type:
- Article
Reconfigurable Secure Video Codec Based on DWT and AES Processor.
- Published in:
- Journal of Applied Computer Science & Mathematics, 2010, n. 9, p. 36
- By:
- Publication type:
- Article
Encryption Algorithms Design using Programmable Logic Circuits.
- Published in:
- Petroleum - Gas University of Ploiesti Bulletin, Technical Series, 2009, v. 61, n. 3, p. 173
- By:
- Publication type:
- Article
Considerations about RFID Systems Vulnerabilities.
- Published in:
- Petroleum - Gas University of Ploiesti Bulletin, Technical Series, 2009, v. 61, n. 3, p. 87
- By:
- Publication type:
- Article
The legal and ethical aspects of telemedicine. 2: Data protection, security and European law.
- Published in:
- 1998
- By:
- Publication type:
- journal article
Input Contract Testing of Graphical User Interfaces.
- Published in:
- International Journal of Software Engineering & Knowledge Engineering, 2016, v. 26, n. 2, p. 183, doi. 10.1142/S0218194016500091
- By:
- Publication type:
- Article
Integrating Application Security into Software Development.
- Published in:
- IT Professional, 2010, v. 12, n. 2, p. 6, doi. 10.1109/MITP.2010.58
- By:
- Publication type:
- Article