Results 31 to 40 of about 4,301,094 (348)
Coded Computing for Secure Boolean Computations [PDF]
The growing size of modern datasets necessitates splitting a large scale computation into smaller computations and operate in a distributed manner. Adversaries in a distributed system deliberately send erroneous data in order to affect the computation for their benefit.
A. Salman Avestimehr, Chien-Sheng Yang
openaire +3 more sources
Creating Cybersecurity Knowledge Graphs From Malware After Action Reports
After Action Reports (AARs) provide incisive analysis of cyber-incidents. Extracting cyber-knowledge from these sources would provide security analysts with credible information, which they can use to detect or find patterns indicative of a cyber-attack.
Aritran Piplai+5 more
doaj +1 more source
Proposed Method to Enhance the Security of Blowfish Algorithm [PDF]
The selective application of technological and related procedural safeguards is an important responsibility of every organization in providing adequate security to its electronic data systems.
Shaimaa H. Shaker
doaj +1 more source
Serverless computing: a security perspective
AbstractIn this article we review the current serverless architectures, abstract and categorize their founding principles, and provide an in-depth security analysis. In particular, we: show the security shortcomings of the analyzed serverless architectural paradigms; point to possible countermeasures; and, highlight several research directions for ...
Marin, Eduard+2 more
openaire +3 more sources
Computer-Security-Oriented Escape Room
Every day, new types of attacks are being developed with companies as their targets. If employees are not aware of the consequences and tactics of such attacks, they cannot protect the companies that employ them.
Erwan Béguin+10 more
semanticscholar +1 more source
Secure computation without computers
The design of secure protocols which can be used without the aid of a computer and without cryptographic knowledge is an interesting and challenging research task. Indeed, protocols enjoying these features could be useful in a variety of settings where computers cannot be used or where people feel uncomfortable to interact with or trust a computer.
D'ARCO, Paolo, DE PRISCO, Roberto
openaire +2 more sources
Interactive Secure Function Computation [PDF]
We consider interactive computation of randomized functions between two users with the following privacy requirement: the interaction should not reveal to either user any extra information about the other user's input and output other than what can be inferred from the user's own input and output.
Deepesh Data+3 more
openaire +4 more sources
Siber Suçların Siber Saldırılara Maruz Kalan Şirketlerin Hisse Senedi Fiyatları Üzerindeki Etkileri
Amaç: İnternet ve diğer dijital teknolojileri kullanarak işlenen yasa dışı faaliyetler, siber suç olarak adlandırılmaktadır. Siber suçlar, kullanıcıların gizli verilerine yetkisiz erişim, DOS saldırıları, virüs yayma, çevrimiçi dolandırıcılık ve ...
Barış Aksoy, Necati Alp Erilli
doaj +1 more source
Security has become a matter of utmost importance since the aftermath of September 11th, especially in the area of computer systems. There are many options that a health educator can do as an individual to help secure the computer system at their worksite and in their home.
Edward A. Schmalz
openalex +3 more sources
The enforcement of security policies for computation [PDF]
Security policies define who may use what information in a computer system. Protection mechanisms are built into a system to enforce security policies. In most systems, however, it is quite unclear what policies a mechanism can or does enforce. This paper defines security policies and protection mechanisms precisely and bridges the gap ...
Anita K. Jones, Richard J. Lipton
openaire +3 more sources