Results 11 to 20 of about 1,662,639 (284)

Measuring security practices

open access: yesCommunications of the ACM, 2022
Users are encouraged to adopt a wide array of technologies and behaviors to reduce their security risk. However, the adoption of these "best practices," ranging from the use of antivirus products to keeping software updated, is not well understood, nor is their practical impact on security risk well established.
Louis F. DeKoven   +8 more
openaire   +1 more source

Improved Practical Vulnerability Analysis of Mouse Data According to Offensive Security based on Machine Learning in Image-Based User Authentication

open access: yesEntropy, 2020
The objective of this study was to verify the feasibility of mouse data exposure by deriving features to improve the accuracy of a mouse data attack technique using machine learning models. To improve the accuracy, the feature appearing between the mouse
Kyungroul Lee, Sun-Young Lee
doaj   +1 more source

Simple and Rigorous Proof Method for the Security of Practical Quantum Key Distribution in the Single-Qubit Regime Using Mismatched Basis Measurements

open access: yesQuantum Reports, 2023
Quantum key distribution (QKD) protocols aim at allowing two parties to generate a secret shared key. While many QKD protocols have been proven unconditionally secure in theory, practical security analyses of experimental QKD implementations typically do
Michel Boyer   +4 more
doaj   +1 more source

The Perception of Security and Youth: A Practical Example

open access: yesSocial Sciences, 2023
This investigation presents the perspective that Spanish postgraduate students have on security. The data compiled here encompass the results of a research study involving Spanish Master’s students with backgrounds in international law and international ...
María Vílchez, Francisco Trujillo
doaj   +1 more source

Practical Security

open access: yesITNOW, 2023
Abstract Think before you open an attachment, says Timothy Clark MBCS as he examines macros and their risks.
openaire   +1 more source

Satellite quantum communications: Fundamental bounds and practical security

open access: yesPhysical Review Research, 2021
Satellite quantum communications are emerging within the panorama of quantum technologies as a more effective strategy to distribute completely secure keys at very long distances, therefore playing an important role in the architecture of a large-scale ...
Stefano Pirandola
doaj   +1 more source

Quantum key distribution with an efficient countermeasure against correlated intensity fluctuations in optical pulses [PDF]

open access: yes, 2018
Quantum key distribution (QKD) allows two distant parties to share secret keys with the proven security even in the presence of an eavesdropper with unbounded computational power.
Fujiwara, Mikio   +9 more
core   +3 more sources

Security Practices

open access: yes, 2010
Practices refer to collective and historic acts that shaped the evolution of the fundamental distinction used to define the field of security—that of internal vs. external security. In general, security practices relate to two kinds of tools through which professionals of (in)security think about a threat: regulatory tools, which seek to “normalize ...
Balzacq, Thierry   +4 more
openaire   +4 more sources

Practical continuous-variable quantum key distribution with composable security

open access: yesNature Communications, 2022
Continuous-variable QKD protocols are usually easier to implement than discrete-variables ones, but their security analyses are less developed. Here, the authors propose and demonstrate in the lab a CVQKD protocol that can generate composable keys secure
Nitin Jain   +12 more
doaj   +1 more source

Implementation of two-party protocols in the noisy-storage model [PDF]

open access: yes, 2010
The noisy-storage model allows the implementation of secure two-party protocols under the sole assumption that no large-scale reliable quantum storage is available to the cheating party.
B. Qi   +18 more
core   +3 more sources

Home - About - Disclaimer - Privacy