Sciweavers

14824 search results - page 17 / 2965
» Security - Introduction
Sort
View
CCS
2011
ACM
14 years 11 days ago
Ciphers that securely encipher their own keys
Mihir Bellare, David Cash, Sriram Keelveedhi
126
Voted
IWSEC
2010
Springer
14 years 11 months ago
Security Metrics and Security Investment Models
Abstract. Planning information security investment is somewhere between art and science. This paper reviews and compares existing scientific approaches and discusses the relation ...
Rainer Böhme
ESORICS
2002
Springer
16 years 9 hour ago
Equal To The Task?
James Heather, Steve Schneider
IEEEARES
2010
IEEE
15 years 7 months ago
Information Flow in Disaster Management Systems
Achim D. Brucker, Dieter Hutter