Results 31 to 40 of about 4,673,218 (333)

Assessing the impact of affective feedback on end-user security awareness [PDF]

open access: yes, 2017
A lack of awareness regarding online security behaviour can leave users and their devices vulnerable to compromise. This paper highlights potential areas where users may fall victim to online attacks, and reviews existing tools developed to raise users ...
Archibald, Jacqueline   +2 more
core   +2 more sources

A Security-Oriented Analysis of Web Inclusions in the Italian Public Administration

open access: yesCybernetics and Information Technologies, 2018
Modern web sites serve content that browsers fetch automatically from a number of different web servers that may be placed anywhere in the world. Such content is essential for defining the appearance and behavior of a web site and is thus a potential ...
Bartoli A.   +4 more
doaj   +1 more source

An Expressive Model for the Web Infrastructure: Definition and Application to the BrowserID SSO System [PDF]

open access: yes, 2014
The web constitutes a complex infrastructure and as demonstrated by numerous attacks, rigorous analysis of standards and web applications is indispensable. Inspired by successful prior work, in particular the work by Akhawe et al.
Fett, Daniel   +2 more
core   +2 more sources

Improved High-Order Masked Generation of Masking Vector and Rejection Sampling in Dilithium

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
for Dilithium, the post-quantum signature scheme recently standardized by NIST. We improve the masked generation of the masking vector y, based on a fast Booleanto- arithmetic conversion modulo q.
Jean-Sébastien Coron   +4 more
doaj   +1 more source

Novel Architecture for Efficient Implementation of Modular Exponentiation Algorithm [PDF]

open access: yesInternational Journal of Web Research
One of the most difficult problems in web research is security. Cryptography is the fundamental technique utilized in secure communication. One key element of cryptography is Public-Key Cryptography (PKC).
Abdalhossein Rezai
doaj   +1 more source

Some Potential Issues with the Security of HTML5 IndexedDB [PDF]

open access: yes, 2014
The new HTML5 standard provides much more access to client resources, such as user location and local data storage. Unfortunately, this greater access may create new security risks that potentially can yield new threats to user privacy and web attacks ...
Ellman, Jeremy   +2 more
core   +1 more source

Security Issues in a SOA-based Provenance System [PDF]

open access: yes, 2006
Recent work has begun exploring the characterization and utilization of provenance in systems based on the Service Oriented Architecture (such as Web Services and Grid based environments).
H.C. Wong   +9 more
core   +2 more sources

The MedSupport Multilevel Intervention to Enhance Support for Pediatric Medication Adherence: Development and Feasibility Testing

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Introduction We developed MedSupport, a multilevel medication adherence intervention designed to address root barriers to medication adherence. This study sought to explore the feasibility and acceptability of the MedSupport intervention strategies to support a future full‐scale randomized controlled trial.
Elizabeth G. Bouchard   +8 more
wiley   +1 more source

Lessons Learned: Quality Analysis of Optical Coherence Tomography in Neuromyelitis Optica

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Introduction Optical coherence tomography (OCT)‐derived retina measurements are markers for neuroaxonal visual pathway status. High‐quality OCT scans are essential for reliable measurements, but their acquisition is particularly challenging in eyes with severe visual impairment, as often observed in neuromyelitis optica spectrum disorders ...
Hadi Salih   +40 more
wiley   +1 more source

Building in web application security at the requirements stage : a tool for visualizing and evaluating security trade-offs : a thesis presented in partial fulfilment of the requirements for the degree of Master of Information Science in Information Systems at Massey University, Albany, New Zealand [PDF]

open access: yes, 2007
One dimension of Internet security is web application security. The purpose of this Design-science study was to design, build and evaluate a computer-based tool to support security vulnerability and risk assessment in the early stages of web application ...
Nehring, Natalia Alekseevna
core  

Home - About - Disclaimer - Privacy