Sciweavers

19 search results - page 3 / 4
» Securing BGP - A Literature Survey
Sort
View
JSA
2007
139views more  JSA 2007»
13 years 5 months ago
High-speed hardware implementations of Elliptic Curve Cryptography: A survey
For the last decade, Elliptic Curve Cryptography (ECC) has gained increasing acceptance in the industry and the academic community and has been the subject of several standards. T...
Guerric Meurice de Dormale, Jean-Jacques Quisquate...
IEEEARES
2007
IEEE
13 years 12 months ago
Web Engineering Security: Essential Elements
Security is an elusive target in today’s high-speed and extremely complex, Web enabled, information rich business environment. This paper presents the idea that there are essent...
William Bradley Glisson, Ray Welland
CHIMIT
2008
ACM
13 years 7 months ago
Guidelines for designing IT security management tools
An important factor that impacts the effectiveness of security systems within an organization is the usability of security management tools. In this paper, we present a survey of ...
Pooya Jaferian, David Botta, Fahimeh Raja, Kirstie...
IEEEIAS
2009
IEEE
14 years 7 days ago
Organizational Barriers to the Implementation of Security Engineering
: The link between security engineering and systems engineering exists at the earliest stage of systems development, and, as a whole, there is sufficient evidence to suggest the di...
Bryan Stewart Cline
IJIEM
2010
169views more  IJIEM 2010»
13 years 4 months ago
Information security and privacy in healthcare: current state of research
Information security and privacy in the healthcare sector is an issue of growing importance. The adoption of digital patient records, increased regulation, provider consolidation,...
Ajit Appari, M. Eric Johnson