Results 11 to 20 of about 1,662,639 (284)
Users are encouraged to adopt a wide array of technologies and behaviors to reduce their security risk. However, the adoption of these "best practices," ranging from the use of antivirus products to keeping software updated, is not well understood, nor is their practical impact on security risk well established.
Louis F. DeKoven +8 more
openaire +1 more source
The objective of this study was to verify the feasibility of mouse data exposure by deriving features to improve the accuracy of a mouse data attack technique using machine learning models. To improve the accuracy, the feature appearing between the mouse
Kyungroul Lee, Sun-Young Lee
doaj +1 more source
Quantum key distribution (QKD) protocols aim at allowing two parties to generate a secret shared key. While many QKD protocols have been proven unconditionally secure in theory, practical security analyses of experimental QKD implementations typically do
Michel Boyer +4 more
doaj +1 more source
The Perception of Security and Youth: A Practical Example
This investigation presents the perspective that Spanish postgraduate students have on security. The data compiled here encompass the results of a research study involving Spanish Master’s students with backgrounds in international law and international ...
María Vílchez, Francisco Trujillo
doaj +1 more source
Abstract Think before you open an attachment, says Timothy Clark MBCS as he examines macros and their risks.
openaire +1 more source
Satellite quantum communications: Fundamental bounds and practical security
Satellite quantum communications are emerging within the panorama of quantum technologies as a more effective strategy to distribute completely secure keys at very long distances, therefore playing an important role in the architecture of a large-scale ...
Stefano Pirandola
doaj +1 more source
Quantum key distribution with an efficient countermeasure against correlated intensity fluctuations in optical pulses [PDF]
Quantum key distribution (QKD) allows two distant parties to share secret keys with the proven security even in the presence of an eavesdropper with unbounded computational power.
Fujiwara, Mikio +9 more
core +3 more sources
Practices refer to collective and historic acts that shaped the evolution of the fundamental distinction used to define the field of security—that of internal vs. external security. In general, security practices relate to two kinds of tools through which professionals of (in)security think about a threat: regulatory tools, which seek to “normalize ...
Balzacq, Thierry +4 more
openaire +4 more sources
Practical continuous-variable quantum key distribution with composable security
Continuous-variable QKD protocols are usually easier to implement than discrete-variables ones, but their security analyses are less developed. Here, the authors propose and demonstrate in the lab a CVQKD protocol that can generate composable keys secure
Nitin Jain +12 more
doaj +1 more source
Implementation of two-party protocols in the noisy-storage model [PDF]
The noisy-storage model allows the implementation of secure two-party protocols under the sole assumption that no large-scale reliable quantum storage is available to the cheating party.
B. Qi +18 more
core +3 more sources

