Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
    • by 
    •   5  
      Computational Science and EngineeringSensor NetworkComputer crimeSystem Security
    • by 
    •   8  
      Power SystemInformation Communication TechnologyCritical Information InfrastructuresPower Grid
The recently introduced Galois/Counter Mode (GCM) of op- eration for block ciphers provides both encryption and message authenti- cation, using universal hashing based on multiplication in a binary finite field. We analyze its security... more
    • by 
    •   7  
      Hardware DesignStandard ModelIT SecuritySystem Security
    • by 
    •   212  
      ManagementEcological EngineeringOptical EngineeringBiochemistry
    • by 
    •   8  
      Energy PolicyEnergy SecurityMultidisciplinaryElectricity Market
This paper presents the design and implementation of a new PKI-based electronic document protection system named EDPro (Electronic Document Protection management system). We first present the highlights of EDPro system; then introduce the... more
    • by 
    •   5  
      System DesignPublic key cryptographySystem SecurityManagement System
    • by 
    •   3  
      Electronic VotingSystem AnalysisSystem Security
Corporate adoption of new server virtualization technologies offered by VMWare, Microsoft, the open source community (Xen) and others raises both new opportunities and new risks for system security. Security issues of virtualization have... more
    • by 
    •   8  
      EngineeringInformation SecurityVirtualizationSecurity Management
    • by 
    •   7  
      Computer ScienceSecurityGrounded TheoryPasswords
    • by 
    •   16  
      Information SystemsBiometricsApplied EconomicsAuthentication
    • by  and +1
    •   16  
      PrivacyBusiness IntelligenceAccess ControlData Privacy
    • by 
    •   13  
      Information and Communication technologyModel validationSecurity RequirementsProcess Improvement
Online Examination System is the most important component of E-Education because of the security issues. Cheating-free is the main challenge that faces the online examination system versus the traditional paper and pencil exams. This... more
    • by 
    •   2  
      Online LearningSystem Security
    • by 
    •   4  
      Computer SecurityCyber SecurityFormal VerificationSystem Security
    • by 
    •   5  
      Wireless CommunicationsFPGAVhdlFSM
    • by 
    •   6  
      PsychologyFactor analysisBusiness and ManagementExternal Validity
    • by 
    •   9  
      CybercrimesNetwork SecurityComputer NetworksDatabase Security
    • by 
    •   9  
      Computer SecurityIntrusion Detection SystemsVulnerabilityComplex System
    • by 
    •   17  
      Linear ProgrammingPower SystemArtificial Neural NetworksPredictive models
The TCP/IP protocol suite is known to be lacking security in many aspects, which may allow an attacker to leverage them using some techniques in the form of covert communications. Secret messages could be embedded into one of the TCP/IP... more
    • by 
    •   10  
      Network SecurityTcp/IpIntrusion Detection SystemsEncryption
    • by 
    •   212  
      ManagementEcological EngineeringOptical EngineeringBiochemistry
    • by 
    •   8  
      Computer ScienceInformation SecurityDistributed SystemSecurity Engineering
    • by  and +1
    •   7  
      Information SecurityInformation Systems SecuritySecurity RequirementsNon Functional Requirement
    • by 
    •   206  
      ManagementMarketingEngineeringEcological Engineering
    • by 
    •   18  
      Civil EngineeringCarbon DioxideDeveloping CountriesIntelligent Transport System
Increasing consumer demands, competition, issue on work productivity, high operational costs and profitability are some of the major reasons why banks acquire a core banking system. This study generally aimed to assess the implementation... more
    • by  and +1
    •   3  
      System SecurityeICBACore Banking System
    • by 
    •   11  
      Markov ProcessesAuthenticationEntropySecurity Policy
    • by 
    •   183  
      ManagementEcological EngineeringOptical EngineeringBiochemistry
    • by 
    •   191  
      ManagementEcological EngineeringOptical EngineeringBiochemistry
    • by 
    •   205  
      ManagementMarketingEngineeringEcological Engineering
    • by 
    •   18  
      Intellectual PropertyControl systemNatural GasNational Security
    • by 
    •   7  
      Pattern RecognitionSpeech RecognitionNeural NetworkSpeech Processing
    • by 
    •   13  
      Information SystemsAlgorithmsBiometryImage Quality
    • by 
    •   182  
      ManagementEcological EngineeringOptical EngineeringBiochemistry
What are the relative advantages and disadvantages of bank-based financial systems (as in Germany and Japan) and market-based financial systems (as in England and the United States). Does financial structure matter? In bank-based systems... more
    • by 
    •   24  
      Financial EconomicsEconomic TheoryEconomic policyRisk Management
    • by  and +1
    •   3  
      SafetySystem SecuritySystem Safety
    • by 
    •   205  
      ManagementMarketingEngineeringEcological Engineering
    • by 
    •   211  
      ManagementEcological EngineeringOptical EngineeringBiochemistry
The increasing rate of crime, attacks by thieves, intruders and vandals, despite all forms of security gadgets and locks still need the attention of researchers to find a permanent solution to the well being of lives and properties of... more
    • by 
    •   20  
      Software Systems SecurityEmbedded Systems SecurityAVR and MCU based security systemPublic Distribution System and Food Security
Security awareness is very essential in securing intellectual property, in particular internal corporate information assets and its “Knowledge”. The dynamic nature of security attacks and the need to comply with government policies in... more
    • by 
    •   10  
      Intellectual PropertyKnowledge ManagementLiterature ReviewUser Involvement
In 2005, the University of Southern California's Institute for Critical Information Infrastructure Protection (ICIIP) developed a conceptual framework for enterprise security. ICIIP seeks to close the gap between the current corporate... more
    • by 
    •   6  
      Security ManagementConceptual FrameworkInformation InfrastructureSystem Security
The increasing rate of crime, attacks by thieves, intruders and vandals, despite all forms of security gadgets and locks still need the attention of researchers to find a permanent solution to the well being of lives and properties of... more
    • by 
    •   20  
      Computer ScienceSoftware Systems SecurityEmbedded Systems SecurityPower System Security
In the networked economy, strategic partnerships and collaboration are an important way to develop and maintain competitive advantages. At the same time, enterprises also need to reduce costs, increase revenues and seize new business... more
    • by 
    •   11  
      Competitive advantageIdentity managementFinancial ServicesCase Study
    • by 
    • System Security
    • by 
    •   212  
      ManagementEcological EngineeringOptical EngineeringBiochemistry
The successful initiation and execution of a virtual team is gaining increasing attention in the design and construction community. From opportunities to integrate international and multidisciplinary teams to the opportunity to leverage... more
    • by 
    •   12  
      Project ManagementConstruction ManagementResource AllocationConstruction Industry
    • by 
    •   11  
      Social NetworkingModeling LanguageProtocolsFormal Verification
    • by 
    •   3  
      OPERATING SYSTEMEarly WarningSystem Security
    • by 
    •   211  
      ManagementEcological EngineeringOptical EngineeringBiochemistry