Results 1 to 10 of about 5,973,902 (354)

Computer security and security technologies [PDF]

open access: yesJournal of Process Management. New Technologies, 2013
With the increasing development of computer and communications technology growth and increasing needs and development of information systems security. The problem of security must be approached with greater caution. With the development of computer and communication technologies have developed numerous tools to protect files and other information.
Dragan Velickovic, Lazar Stošić
openaire   +3 more sources

Understanding Computer Security [PDF]

open access: yesFrontiers in ICT, 2014
Few things in society and everyday life have changed in the last 10 years as much as the concept of security. From bank robberies to wars, what used to imply a great deal of violence is now silently happening on the Internet. Perhaps more strikingly, the very idea of privacy – a concept closely related to that of individual freedom – is undergoing such
Nicola Zannone   +2 more
core   +14 more sources

COMPUTER SECURITY [PDF]

open access: yesHUMAN. ENVIRONMENT. TECHNOLOGIES. Proceedings of the Students International Scientific and Practical Conference, 2017
The paper contains information about hacking types and systems which they are suffered the most cyber attack. The main goal is to introduce people how to protect your systems from several cyber attacks following by special guidelines.
Glīzds, Lauris, Teilāns, Artis
openaire   +5 more sources

Computer Security: Competing Concepts [PDF]

open access: greenarXiv, 2001
This paper focuses on a tension we discovered in the philosophical part of our multidisciplinary project on values in web-browser security. Our project draws on the methods and perspectives of empirical social science, computer science, and philosophy to identify values embodied in existing web-browser security and also to prescribe changes to existing
Helen Nissenbaum   +2 more
arxiv   +3 more sources

Computer Security

open access: goldCalifornian Journal of Health Promotion, 2005
Security has become a matter of utmost importance since the aftermath of September 11th, especially in the area of computer systems. There are many options that a health educator can do as an individual to help secure the computer system at their worksite and in their home.
Edward A. Schmalz
openalex   +3 more sources

Federated Secure Computing

open access: yesInformatics, 2023
Privacy-preserving computation (PPC) enables encrypted computation of private data. While advantageous in theory, the complex technology has steep barriers to entry in practice. Here, we derive design goals and principles for a middleware that encapsulates the demanding cryptography server side and provides a simple-to-use interface to client-side ...
Hendrik Ballhausen   +1 more
openaire   +2 more sources

Interactive Secure Function Computation [PDF]

open access: yesIEEE Transactions on Information Theory, 2020
We consider interactive computation of randomized functions between two users with the following privacy requirement: the interaction should not reveal to either user any extra information about the other user's input and output other than what can be inferred from the user's own input and output.
Deepesh Data   +3 more
openaire   +5 more sources

Towards operational measures of computer security [PDF]

open access: yes, 1993
Ideally, a measure of the security of a system should capture quantitatively the intuitive notion of ‘the ability of the system to resist attack’. That is, it should be operational, reflecting the degree to which the system can be expected to remain free
Brocklehurst, S.   +8 more
core   +2 more sources

Security in Approximate Computing and Approximate Computing for Security: Challenges and Opportunities [PDF]

open access: yesProceedings of the IEEE, 2020
Approximate computing is an advanced computational technique that trades the accuracy of computation results for better utilization of system resources. It has emerged as a new preferable paradigm over traditional computing architectures for many applications where inaccurate results are acceptable.
Weiqiang Liu   +5 more
openaire   +4 more sources

Home - About - Disclaimer - Privacy