Results 21 to 30 of about 1,364,067 (299)

Vulnerabilities and responsibilities: dealing with monsters in computer security [PDF]

open access: yes, 2009
Purpose – The purpose of this paper is to analyze information security assessment in terms of cultural categories and virtue ethics, in order to explain the cultural origin of certain types of security vulnerabilities, as well as to enable a proactive ...
Consoli, L., Pieters, W.
core   +10 more sources

COMPUTER SECURITY AND SECURITY TECHNOLOGIES [PDF]

open access: yesJournal of Process Management and New Technologies, 2013
With the increasing development of computer and communications technology growth and increasing needs and development of information systems security. The problem of security must be approached with greater caution.
Lazar Stošić, Dragan Veličković
doaj  

Proposed Method to Enhance the Security of Blowfish Algorithm [PDF]

open access: yesEngineering and Technology Journal, 2011
The selective application of technological and related procedural safeguards is an important responsibility of every organization in providing adequate security to its electronic data systems.
Shaimaa H. Shaker
doaj   +1 more source

Demystifying Blockchain Technology for Resource-Constrained IoT Devices: Parameters, Challenges and Future Perspective

open access: yesIEEE Access, 2021
One of the most promising enablers for the secure distributed operation of the Internet of Things (IoT) systems could be based on a mathematical construct widely known as blockchain that aims to neglect the system’s centralization and scalability ...
Inna Romashkova   +2 more
doaj   +1 more source

Internet security for mobile computing [PDF]

open access: yes, 2017
Mobile devices are now the most dominant computer platform. Every time a mobile web application accesses the internet, the end user’s data is susceptible to malicious attacks.
Davis, Vincent Anthony
core   +1 more source

Game Based Learning for Safety and Security Education [PDF]

open access: yes, 2020
Safety and security education are important part of technology related education, because of recent number of increase in safety and security related incidents.
Jin, G. (Ge)   +2 more
core   +3 more sources

European Cyber Security System [PDF]

open access: yes, 2012
Nowadays computer networks are widely spread in all spheres of human life. That is why the problem of cyber security of mankind is of great importance. Today, the European Union makes efforts to guarantee network safety in Europe by means of increase ...
Buffet, Jean-Charles   +3 more
core   +1 more source

Information Security Governance Framework in Public Cloud a Case in Low Resource Economies in Uganda

open access: yesJournal of Innovation Information Technology and Application, 2022
The study aimed at exploring the critical enablers to the development and usage of information security governance frameworks for cloud computing in Uganda.
Fredrick Kanobe   +2 more
doaj   +1 more source

Analysis of the implications of digital voting through neutrosophic Delphi modeling [PDF]

open access: yesJournal of Fuzzy Extension and Applications
The modernization of electoral systems through digital technologies, such as electronic voting, has marked significant progress in emerging regions like Santo Domingo de los Tsáchilas, Ecuador.
Diego Pablo Palma Rivera   +3 more
doaj   +1 more source

Computer-aided proofs for multiparty computation with active security [PDF]

open access: yes, 2018
Secure multi-party computation (MPC) is a general cryptographic technique that allows distrusting parties to compute a function of their individual inputs, while only revealing the output of the function.
Haagh, Helene   +4 more
core   +2 more sources

Home - About - Disclaimer - Privacy