Sciweavers

1627 search results - page 45 / 326
» High Security Smartcards
Sort
View
WWW
2008
ACM
16 years 15 days ago
Secure or insure?: a game-theoretic analysis of information security games
Despite general awareness of the importance of keeping one's system secure, and widespread availability of consumer security technologies, actual investment in security remai...
Jens Grossklags, Nicolas Christin, John Chuang
CCS
2008
ACM
15 years 1 months ago
Efficient security primitives derived from a secure aggregation algorithm
By functionally decomposing a specific algorithm (the hierarchical secure aggregation algorithm of Chan et al. [3] and Frikken et al. [7]), we uncover a useful general functionali...
Haowen Chan, Adrian Perrig
ICSEA
2007
IEEE
15 years 6 months ago
Making Cost Effective Security Decision with Real Option Thinking
One of the major challenges in IT security management is determining how much to spend and where to spend. This requires understanding of the economic issues regarding IT security...
Jingyue Li, Xiaomeng Su
SEC
2008
15 years 1 months ago
Interactive Selection of ISO 27001 Controls under Multiple Objectives
Abstract IT security incidents pose a major threat to the efficient execution of corporate strategies. Although, information security standards provide a holistic approach to mitig...
Thomas Neubauer, Andreas Ekelhart, Stefan Fenz
TIT
2011
126views more  TIT 2011»
14 years 6 months ago
The Return of the Cryptographic Boomerang
—The boomerang analysis, together with its offspring the amplified boomerang analysis and the rectangle analysis, are techniques that are widely used in the analysis of block ci...
Sean Murphy