Sciweavers

3149 search results - page 111 / 630
» IT security risk management
Sort
View
72
Voted
IH
1999
Springer
15 years 5 months ago
Secure Steganographic Methods for Palette Images
Jiri Fridrich, Rui Du
52
Voted
CAISE
2006
Springer
15 years 4 months ago
Choosing a Prioritization Method-Case of IS Security Improvement
Camille Salinesi, Elena Kornyshova
90
Voted
ISW
1997
Springer
15 years 4 months ago
Practice-Oriented Provable-Security
Mihir Bellare
ACNS
2008
Springer
115views Cryptology» more  ACNS 2008»
15 years 7 months ago
Steel, Cast Iron and Concrete: Security Engineering for Real World Wireless Sensor Networks
Abstract. What are the real security issues for a wireless sensor network (WSN) intended to monitor the structural health of a suspension bridge, a subway tunnel or a water distrib...
Frank Stajano, Daniel Cvrcek, Matt Lewis