Results 21 to 30 of about 1,364,067 (299)
Vulnerabilities and responsibilities: dealing with monsters in computer security [PDF]
Purpose – The purpose of this paper is to analyze information security assessment in terms of cultural categories and virtue ethics, in order to explain the cultural origin of certain types of security vulnerabilities, as well as to enable a proactive ...
Consoli, L., Pieters, W.
core +10 more sources
COMPUTER SECURITY AND SECURITY TECHNOLOGIES [PDF]
With the increasing development of computer and communications technology growth and increasing needs and development of information systems security. The problem of security must be approached with greater caution.
Lazar Stošić, Dragan Veličković
doaj
Proposed Method to Enhance the Security of Blowfish Algorithm [PDF]
The selective application of technological and related procedural safeguards is an important responsibility of every organization in providing adequate security to its electronic data systems.
Shaimaa H. Shaker
doaj +1 more source
One of the most promising enablers for the secure distributed operation of the Internet of Things (IoT) systems could be based on a mathematical construct widely known as blockchain that aims to neglect the system’s centralization and scalability ...
Inna Romashkova +2 more
doaj +1 more source
Internet security for mobile computing [PDF]
Mobile devices are now the most dominant computer platform. Every time a mobile web application accesses the internet, the end user’s data is susceptible to malicious attacks.
Davis, Vincent Anthony
core +1 more source
Game Based Learning for Safety and Security Education [PDF]
Safety and security education are important part of technology related education, because of recent number of increase in safety and security related incidents.
Jin, G. (Ge) +2 more
core +3 more sources
European Cyber Security System [PDF]
Nowadays computer networks are widely spread in all spheres of human life. That is why the problem of cyber security of mankind is of great importance. Today, the European Union makes efforts to guarantee network safety in Europe by means of increase ...
Buffet, Jean-Charles +3 more
core +1 more source
Information Security Governance Framework in Public Cloud a Case in Low Resource Economies in Uganda
The study aimed at exploring the critical enablers to the development and usage of information security governance frameworks for cloud computing in Uganda.
Fredrick Kanobe +2 more
doaj +1 more source
Analysis of the implications of digital voting through neutrosophic Delphi modeling [PDF]
The modernization of electoral systems through digital technologies, such as electronic voting, has marked significant progress in emerging regions like Santo Domingo de los Tsáchilas, Ecuador.
Diego Pablo Palma Rivera +3 more
doaj +1 more source
Computer-aided proofs for multiparty computation with active security [PDF]
Secure multi-party computation (MPC) is a general cryptographic technique that allows distrusting parties to compute a function of their individual inputs, while only revealing the output of the function.
Haagh, Helene +4 more
core +2 more sources

