Results 51 to 60 of about 2,666,306 (147)

Internalization of Externalities in Interdependent Security: Large Network Cases [PDF]

open access: yesarXiv, 2017
With increasing connectivity among comprising agents or (sub-)systems in large, complex systems, there is a growing interest in understanding interdependent security and dealing with inefficiency in security investments. Making use of a population game model and the well-known Chung-Lu random graph model, we study how one could encourage selfish agents
arxiv  

Semi-Trusted Mixer Based Privacy Preserving Distributed Data Mining for Resource Constrained Devices [PDF]

open access: yes, 2010
In this paper a homomorphic privacy preserving association rule mining algorithm is proposed which can be deployed in resource constrained devices (RCD).
Kaosar, Md. Golam, Yi, Xun
core   +1 more source

Using quantum key distribution for cryptographic purposes: a survey

open access: yes, 2014
The appealing feature of quantum key distribution (QKD), from a cryptographic viewpoint, is the ability to prove the information-theoretic security (ITS) of the established keys. As a key establishment primitive, QKD however does not provide a standalone
,   +23 more
core   +1 more source

Blameworthiness in Security Games [PDF]

open access: yesarXiv, 2019
Security games are an example of a successful real-world application of game theory. The paper defines blameworthiness of the defender and the attacker in security games using the principle of alternative possibilities and provides a sound and complete logical system for reasoning about blameworthiness in such games.
arxiv  

Windows And Linux Operating Systems From A Security Perspective [PDF]

open access: yesarXiv, 2012
Operating systems are vital system software that, without them, humans would not be able to manage and use computer systems. In essence, an operating system is a collection of software programs whose role is to manage computer resources and provide an interface for client applications to interact with the different computer hardware.
arxiv  

A Comparison of Cryptography Courses

open access: yes, 2004
The author taught two courses on cryptography, one at Duke University aimed at non-mathematics majors and one at Rose-Hulman Institute of Technology aimed at mathematics and computer science majors.
Holden, Joshua
core   +1 more source

Contribution of Science and Technology to the Country’s National Security

open access: yesUnity Journal
In the face of Nepal's constant vulnerability to major geopolitical forces, the country has yet to fully harness technology to safeguard its national interests.
Chirag Govinda Shrestha
semanticscholar   +1 more source

Understanding the Inefficiency of Security-Constrained Economic Dispatch [PDF]

open access: yesarXiv, 2017
The security-constrained economic dispatch (SCED) problem tries to maintain the reliability of a power network by ensuring that a single failure does not lead to a global outage. The previous research has mainly investigated SCED by formulating the problem in different modalities, e.g. preventive or corrective, and devising efficient solutions for SCED.
arxiv  

Introduction to Post-Quantum Cryptography in Scope of NIST's Post-Quantum Competition [PDF]

open access: yes, 2019
Tänapäeval on andmeturve paljudes valdkondades määrava tähtsusega, kuid hiljutised edusammud kvantmehhaanika valdkonnas võivad tänased interneti turvaprotokollid ohtu seada.
Tera, Helen
core  

A Tale of Two Mechanisms: Incentivizing Investments in Security Games [PDF]

open access: yesarXiv, 2015
In a system of interdependent users, the security of an entity is affected not only by that user's investment in security measures, but also by the positive externality of the security decisions of (some of) the other users. The provision of security in such system is therefore modeled as a public good provision problem, and is referred to as a ...
arxiv  

Home - About - Disclaimer - Privacy