A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2009; you can also visit the original URL.
The file type is application/pdf
.
Filters
Secure books: Protecting the distribution of knowledge
[chapter]
1998
Lecture Notes in Computer Science
We undertook a project to secure the distribution of medical information using Wax. ...
While the X.509 philosophy may be suitable for many electronic commerce applications, signatures on which we may have to rely for many years -such as those on books and contractsappear to require a different ...
Acknowledgements Václav Matyáš Jr. would like to thank the Royal Society for supporting his research through a Postdoctoral Fellowship. ...
doi:10.1007/bfb0028155
fatcat:nx7j7fmmfzf2bhzf5gn6ymptj4
Book Theft and Library Security Systems, 1978-79 (Book Review)
1978
College and Research Libraries
Book Theft and Library Security Systems, 1978-79. White Plains, N.Y.: Knowledge Industry Publications, 1978. 128p. $24.50. LC 77-25284. ISBN 0-914236-14-8 . ...
The major section on electronic security systems effectively answers questions that buyers are likely to ask-such as, how the systems work, what they cost, what can be protected, and what special features ...
doi:10.5860/crl_39_05_409
fatcat:uwuc7exkzfawdp65jbd6sm43hq
From digital audiobook to secure digital multimedia-book
2006
Computers in Entertainment
Multimedia contents are protected by a security system that ensures perfect audio quality and full access to multimedia contents only to a legal user. ...
A distribution architecture and a player that use the proposed mechanism are also presented. ...
; (ii) design of a security mechanism that protects the MMCs, ensuring the rights of vendors and guaranteeing to an honest user the freedom offered by an open format; (iii) a distribution architecture ...
doi:10.1145/1146816.1146825
fatcat:w7amah3qcvep5pgf2lsi43kedu
Who Should Read This Book
[chapter]
2016
Securing the Outdoor Construction Site
cause of crashes and security holes. ...
because this is a book about the art of Unix programming. ...
It allows redistribution of modified binaries, but restricts redistribution of modified sources in ways intended to protect the interests of the authors and the free-software community. ...
doi:10.1016/b978-0-12-802383-9.00019-8
fatcat:5cxlhe2k4fbjzfwouwq6qa7iqe
Urban Crime and Security
[chapter]
2021
The Urban Book Series
Finally, a manifesto of data-driven policing is proposed, with its practical demand for efficient security strategies and the development of big data technologies. ...
This chapter reviews the progress made in this topic from historic criminology to data-driven policing. It first reviews the broad implications of urban security and its implementation in practice. ...
Section 14.3 presents the concerns and theories in urban security which is devoted to reducing the urban crime problems and protecting citizenship. ...
doi:10.1007/978-981-15-8983-6_14
fatcat:uioa2i7hk5hvvpk64ahd6dw7ta
Book review "Trade Perspectives in the Context of Safety, Security, Privacy and Loyalty"
2018
Ekonomski Vjesnik
As a result, Chapter 6 seeks to address some of the most important issues of security, legal protection and ethical issues in international trade. ...
The existing literature on distributive and international trade has been recently enriched by the publication entitled Trade Perspectives in the Context of Safety, Security, Privacy and Loyalty edited ...
doaj:39548e18e58948a2a32731f134dcc595
fatcat:xt3qlktu7zb2bekuusqjcibs6i
False Security
1938
The University of Chicago Law Review
BOOK REVIEWS 539
book. However, in spite of such shortcomings, the book marks a step forward in the development of a new type of textbook. ...
Consequently the average person, without knowledge of the facts, is duped and his savings evaporated through the pur- chase of worthless securities. ...
doi:10.2307/1596521
fatcat:czhgzw5uzfac3iq4z6ntx5tmr4
Health Security in the White Book on National Security of the Republic of Poland – a Review of Provisions
2014
Przegląd Strategiczny
Health security in the White Book on National Security of the Republic of Poland... ...
in the White Book on National Security of the Republic of Poland... ...
doi:10.14746/ps.2014.1.31
fatcat:7m2y2ytt5nf7pbsfcyb3r4nqb4
Computer Security Subsystem Interpretation of The Trusted Computer System Evaluation Criteria
[chapter]
1985
The 'Orange Book' Series
features are designed with full knowledge of interfaces and host system support. ...
DISTRIBUTION/AVAILABILITY OF ABSTRACT UNCLASSIFIED/UNLIMITED SAME AS RPT. X DTIC USERS 21. ABSTRACT SECURITY CLASSIFICATION UNCLASSIFIED 22a. NAME OF RESPONSIBLE INDIVIDUAL Michael W. Hale 22b. ...
For most cases, the SRP encompasses the entire subsystem. Subsystem -See "computer security subsystem." System -The combination of the protected system and the computer security subsystem. ...
doi:10.1007/978-1-349-12020-8_11
fatcat:ltkvdwhomzhjpmijze452hbcny
Book Reviews
2020
IEEE Communications Magazine
This book on Blockchain for distributed systems security is one of the timely books available on this topic. ...
This book on Blockchain for distributed systems security is one of the timely books available on this topic. ...
doi:10.1109/mcom.2020.9141184
fatcat:7u77bbgnkbd7rdpibffsfdjzzq
Investing in Distressed Securities
[chapter]
2011
Corporate Financial Distress and Bankruptcy
Course Prerequisites • Basic accounting and financial statement analysis • Basic knowledge of fixed-income and equity securities and related mathematics • Basic corporate finance (discount cash flow analysis ...
courts, vulture investors, distressed debt traders/brokers) to better understand the roles, agendas, and objectives of each of the participants and how they affect investment results. ...
Altman and Edith Hotchkiss (Wiley, 2005)
• Distressed Securities
Edward I. Altman (Beard Books, 1999)
• Breakups
Stuart C. ...
doi:10.1002/9781118267806.ch8
fatcat:tg6rljdf2nbrlkzyaep4fynfwa
Computational Intelligence in Cyber Security
2006
2006 IEEE International Conference on Computational Intelligence for Homeland Security and Personal Safety
The use of these techniques allowed building efficient and robust decision support modules, providing cross-linking solutions to different cyber security applications. ...
With the proliferation of complex distributed and Internet computing, information security and privacy become very important. ...
the area of computer security. ...
doi:10.1109/cihsps.2006.313289
fatcat:t5wir63zwbedrdz2o5cmlwy6ei
Computer security
1976
Proceedings of the June 7-10, 1976, national computer conference and exposition on - AFIPS '76
Current data processing literature is a rich source of information. Articles and papers regarding security, design of software protection, operational practices and auditing number in the thousands. ...
regarding computer vulnerabilities, the discipline of computer security is achieving independent recognition. ...
A widely distributed monograph on data security: it helped bring attention to some of the needs and the problems. 76. ...
doi:10.1145/1499799.1499809
dblp:conf/afips/Browne76
fatcat:buzswfbn55dyhm5ujf44aeklyy
Computer security
1972
ACM SIGMIS Database the DATABASE for Advances in Information Systems
Current data processing literature is a rich source of information. Articles and papers regarding security, design of software protection, operational practices and auditing number in the thousands. ...
regarding computer vulnerabilities, the discipline of computer security is achieving independent recognition. ...
A widely distributed monograph on data security: it helped bring attention to some of the needs and the problems. 76. ...
doi:10.1145/1017536.1017537
fatcat:msh63pxnmvcezc3maea4aak7qa
A Secure TFTP Protocol with Security Proofs
[article]
2014
arXiv
pre-print
We also present the security reduction of SSW-ARQ protocol from Cramer-Shoup encryption scheme and fixed-time side channel security. ...
The target implementation of secure TFTP is for embedded devices such as Wi-Fi Access Points (AP) and remote Base Stations (BS). ...
For the Security Claim 2.2), we can use a similar experiment that is used for Cramer-Shoup encryption scheme except that an adversary are given knowledge of runtime performance of cryptographic computation ...
arXiv:1409.0060v1
fatcat:2mmkf6zx2zfyfbn7bxnfwvm2lq
« Previous
Showing results 1 — 15 out of 192,894 results