Results 41 to 50 of about 2,666,306 (147)
Cloud Server Security using Bio-Cryptography
Data security is becoming more important in cloud computing. Biometrics is a computerized method of identifying a person based on a physiological characteristic. Among the features measured are our face, fingerprints, hand geometry, DNA etc.
Zarnab Khalid+5 more
semanticscholar +1 more source
Prime numbers, whose properties are important subjects in mathematics, are also fundamental in computer science notably in IT security, Cryptocurrencies as Bitcoin and Blockchain, cryptography, Code theory notably Error detection codes, integer ...
Asimi, Ahmed
core
Computer Security: Competing Concepts [PDF]
This paper focuses on a tension we discovered in the philosophical part of our multidisciplinary project on values in web-browser security. Our project draws on the methods and perspectives of empirical social science, computer science, and philosophy to identify values embodied in existing web-browser security and also to prescribe changes to existing
arxiv
Cyberspace security: How to develop a security strategy [PDF]
Despite all visible dividers, the Internet is getting us closer and closer, but with a great price. Our security is the price. The international community is fully aware of the urgent need to secure the cyberspace as you see the multiplication of security standards and national schemes interpreting them beyond borders: ISO 15408, ISO 17799, and ISO ...
arxiv
Amplifying the Security of One-Way Functions — A Proof of Yao's XOR-Lemma [PDF]
In this paper we give a consistent and simple proof for the XOR-Lemma which was hinted at by Yao and subsequently presented by him in lectures. It can be found in print in "E. Kranakis, Primality and Cryptography, Wiley-Teubner Series in Computer Science,
Damm, Frank, Heider, Franz-Peter
core
People Are the Answer to Security: Establishing a Sustainable Information Security Awareness Training (ISAT) Program in Organization [PDF]
Educating the users on the essential of information security is very vital and important to the mission of establishing a sustainable information security in any organization and institute. At the University Technology Malaysia (UTM), we have recognized the fact that, it is about time information security should no longer be a lacking factor in ...
arxiv
Integration of a Predictive, Continuous Time Neural Network into Securities Market Trading Operations [PDF]
This paper describes recent development and test implementation of a continuous time recurrent neural network that has been configured to predict rates of change in securities. It presents outcomes in the context of popular technical analysis indicators and highlights the potential impact of continuous predictive capability on securities market trading
arxiv
Investigating Quantum Computation [PDF]
Advancements in computer science and technology make quantum computation increasingly possible, which would result in unprecedented computational efficiency and allow quantum physicists and chemists to completely model complex quantum mechanical systems.
Uselton, Myranda
core +1 more source
Security Mental Model: Cognitive map approach [PDF]
Security models have been designed to ensure data is accessed and used in proper manner according to the security policies. Unfortunately, human role in designing security models has been ignored. Human behavior relates to many security breaches and plays a significant part in many security situations.In this paper, we study users' security decision ...
arxiv
Designing Rating Systems to Promote Mutual Security for Interconnected Networks [PDF]
Interconnected autonomous systems often share security risks. However, an autonomous system lacks the incentive to make (sufficient) security investments if the cost exceeds its own benefit even though doing that would be socially beneficial. In this paper, we develop a systematic and rigorous framework for analyzing and significantly improving the ...
arxiv