Sciweavers

14824 search results - page 17 / 2965
» Security - Introduction
Sort
View
112
Voted
CCS
2011
ACM
14 years 2 months ago
Ciphers that securely encipher their own keys
Mihir Bellare, David Cash, Sriram Keelveedhi
147
Voted
IWSEC
2010
Springer
15 years 28 days ago
Security Metrics and Security Investment Models
Abstract. Planning information security investment is somewhere between art and science. This paper reviews and compares existing scientific approaches and discusses the relation ...
Rainer Böhme
ESORICS
2002
Springer
16 years 2 months ago
Equal To The Task?
James Heather, Steve Schneider
IEEEARES
2010
IEEE
15 years 9 months ago
Information Flow in Disaster Management Systems
Achim D. Brucker, Dieter Hutter