Results 31 to 40 of about 4,301,094 (348)

Coded Computing for Secure Boolean Computations [PDF]

open access: yesIEEE Journal on Selected Areas in Information Theory, 2021
The growing size of modern datasets necessitates splitting a large scale computation into smaller computations and operate in a distributed manner. Adversaries in a distributed system deliberately send erroneous data in order to affect the computation for their benefit.
A. Salman Avestimehr, Chien-Sheng Yang
openaire   +3 more sources

Creating Cybersecurity Knowledge Graphs From Malware After Action Reports

open access: yesIEEE Access, 2020
After Action Reports (AARs) provide incisive analysis of cyber-incidents. Extracting cyber-knowledge from these sources would provide security analysts with credible information, which they can use to detect or find patterns indicative of a cyber-attack.
Aritran Piplai   +5 more
doaj   +1 more source

Proposed Method to Enhance the Security of Blowfish Algorithm [PDF]

open access: yesEngineering and Technology Journal, 2011
The selective application of technological and related procedural safeguards is an important responsibility of every organization in providing adequate security to its electronic data systems.
Shaimaa H. Shaker
doaj   +1 more source

Serverless computing: a security perspective

open access: yesJournal of Cloud Computing, 2022
AbstractIn this article we review the current serverless architectures, abstract and categorize their founding principles, and provide an in-depth security analysis. In particular, we: show the security shortcomings of the analyzed serverless architectural paradigms; point to possible countermeasures; and, highlight several research directions for ...
Marin, Eduard   +2 more
openaire   +3 more sources

Computer-Security-Oriented Escape Room

open access: yesIEEE Security and Privacy, 2019
Every day, new types of attacks are being developed with companies as their targets. If employees are not aware of the consequences and tactics of such attacks, they cannot protect the companies that employ them.
Erwan Béguin   +10 more
semanticscholar   +1 more source

Secure computation without computers

open access: yesTheoretical Computer Science, 2016
The design of secure protocols which can be used without the aid of a computer and without cryptographic knowledge is an interesting and challenging research task. Indeed, protocols enjoying these features could be useful in a variety of settings where computers cannot be used or where people feel uncomfortable to interact with or trust a computer.
D'ARCO, Paolo, DE PRISCO, Roberto
openaire   +2 more sources

Interactive Secure Function Computation [PDF]

open access: yesIEEE Transactions on Information Theory, 2020
We consider interactive computation of randomized functions between two users with the following privacy requirement: the interaction should not reveal to either user any extra information about the other user's input and output other than what can be inferred from the user's own input and output.
Deepesh Data   +3 more
openaire   +4 more sources

Siber Suçların Siber Saldırılara Maruz Kalan Şirketlerin Hisse Senedi Fiyatları Üzerindeki Etkileri

open access: yesİşletme Bilimi Dergisi, 2021
Amaç: İnternet ve diğer dijital teknolojileri kullanarak işlenen yasa dışı faaliyetler, siber suç olarak adlandırılmaktadır. Siber suçlar, kullanıcıların gizli verilerine yetkisiz erişim, DOS saldırıları, virüs yayma, çevrimiçi dolandırıcılık ve ...
Barış Aksoy, Necati Alp Erilli
doaj   +1 more source

Computer Security

open access: goldCalifornian Journal of Health Promotion, 2005
Security has become a matter of utmost importance since the aftermath of September 11th, especially in the area of computer systems. There are many options that a health educator can do as an individual to help secure the computer system at their worksite and in their home.
Edward A. Schmalz
openalex   +3 more sources

The enforcement of security policies for computation [PDF]

open access: yesJournal of Computer and System Sciences, 1975
Security policies define who may use what information in a computer system. Protection mechanisms are built into a system to enforce security policies. In most systems, however, it is quite unclear what policies a mechanism can or does enforce. This paper defines security policies and protection mechanisms precisely and bridges the gap ...
Anita K. Jones, Richard J. Lipton
openaire   +3 more sources

Home - About - Disclaimer - Privacy