Results 41 to 50 of about 2,666,306 (147)

Cloud Server Security using Bio-Cryptography

open access: yesInternational Journal of Advanced Computer Science and Applications, 2019
Data security is becoming more important in cloud computing. Biometrics is a computerized method of identifying a person based on a physiological characteristic. Among the features measured are our face, fingerprints, hand geometry, DNA etc.
Zarnab Khalid   +5 more
semanticscholar   +1 more source

Conjectures in number theory

open access: yes, 2023
Prime numbers, whose properties are important subjects in mathematics, are also fundamental in computer science notably in IT security, Cryptocurrencies as Bitcoin and Blockchain, cryptography, Code theory notably Error detection codes, integer ...
Asimi, Ahmed
core  

Computer Security: Competing Concepts [PDF]

open access: yesarXiv, 2001
This paper focuses on a tension we discovered in the philosophical part of our multidisciplinary project on values in web-browser security. Our project draws on the methods and perspectives of empirical social science, computer science, and philosophy to identify values embodied in existing web-browser security and also to prescribe changes to existing
arxiv  

Cyberspace security: How to develop a security strategy [PDF]

open access: yesDans V. International conference Cyberspace 2007 (2007), 2007
Despite all visible dividers, the Internet is getting us closer and closer, but with a great price. Our security is the price. The international community is fully aware of the urgent need to secure the cyberspace as you see the multiplication of security standards and national schemes interpreting them beyond borders: ISO 15408, ISO 17799, and ISO ...
arxiv  

Amplifying the Security of One-Way Functions — A Proof of Yao's XOR-Lemma [PDF]

open access: yes, 1996
In this paper we give a consistent and simple proof for the XOR-Lemma which was hinted at by Yao and subsequently presented by him in lectures. It can be found in print in "E. Kranakis, Primality and Cryptography, Wiley-Teubner Series in Computer Science,
Damm, Frank, Heider, Franz-Peter
core  

People Are the Answer to Security: Establishing a Sustainable Information Security Awareness Training (ISAT) Program in Organization [PDF]

open access: yesInternational Journal of Computer Science and Information Security, Vol.11, No 8, August 2013, Paper ID 31071337, 2013
Educating the users on the essential of information security is very vital and important to the mission of establishing a sustainable information security in any organization and institute. At the University Technology Malaysia (UTM), we have recognized the fact that, it is about time information security should no longer be a lacking factor in ...
arxiv  

Integration of a Predictive, Continuous Time Neural Network into Securities Market Trading Operations [PDF]

open access: yesarXiv, 2014
This paper describes recent development and test implementation of a continuous time recurrent neural network that has been configured to predict rates of change in securities. It presents outcomes in the context of popular technical analysis indicators and highlights the potential impact of continuous predictive capability on securities market trading
arxiv  

Investigating Quantum Computation [PDF]

open access: yes, 2019
Advancements in computer science and technology make quantum computation increasingly possible, which would result in unprecedented computational efficiency and allow quantum physicists and chemists to completely model complex quantum mechanical systems.
Uselton, Myranda
core   +1 more source

Security Mental Model: Cognitive map approach [PDF]

open access: yesarXiv, 2018
Security models have been designed to ensure data is accessed and used in proper manner according to the security policies. Unfortunately, human role in designing security models has been ignored. Human behavior relates to many security breaches and plays a significant part in many security situations.In this paper, we study users' security decision ...
arxiv  

Designing Rating Systems to Promote Mutual Security for Interconnected Networks [PDF]

open access: yesarXiv, 2012
Interconnected autonomous systems often share security risks. However, an autonomous system lacks the incentive to make (sufficient) security investments if the cost exceeds its own benefit even though doing that would be socially beneficial. In this paper, we develop a systematic and rigorous framework for analyzing and significantly improving the ...
arxiv  

Home - About - Disclaimer - Privacy