Sciweavers

415 search results - page 2 / 83
» M-Banking Security - a futuristic improved security approach
Sort
View
DSS
2006
91views more  DSS 2006»
13 years 5 months ago
Matching information security vulnerabilities to organizational security profiles: a genetic algorithm approach
Organizations are making substantial investments in information security to reduce the risk presented by vulnerabilities in their information technology (IT) infrastructure. Howev...
Mukul Gupta, Jackie Rees, Alok R. Chaturvedi, Jie ...
WCNC
2008
IEEE
13 years 11 months ago
A Secure Routing Protocol in Proactive Security Approach for Mobile Ad-Hoc Networks
—Secure routing of Mobile Ad-hoc Networks (MANETs) is still a hard problem after years of research. We therefore propose to design a secure routing protocol in a new approach. Th...
Shushan Zhao, Akshai K. Aggarwal, Shuping Liu, Hua...
WPES
2003
ACM
13 years 10 months ago
Leveraging the "Multi" in secure multi-party computation
Secure Multi-Party Computation enables parties with private data to collaboratively compute a global function of their private data, without revealing that data. The increase in s...
Jaideep Vaidya, Chris Clifton
MKWI
2008
137views Business» more  MKWI 2008»
13 years 6 months ago
Improving information security compliance - A process-oriented approach for managing organizational change
Abstract: Enterprises typically have to comply with many different legal, regulatory and internal requirements. Particularly in the context of information processing, there are ded...
Roland Gabriel, Sebastian Sowa, Jochen Wiedemann
AINA
2007
IEEE
13 years 11 months ago
An Improved Approach to Secure Authentication and Signing
We know how to build secure systems but for security measures to be truly effective it is necessary to use keys which are far too large for people to commit to memory. The consequ...
David Argles, Alex Pease, Robert John Walters