Filters








192,894 Hits in 7.8 sec

Secure books: Protecting the distribution of knowledge [chapter]

Ross J. Anderson, Václav Matyáš, Fabien A. Petitcolas, Iain E. Buchan, Rudolf Hanka
1998 Lecture Notes in Computer Science  
We undertook a project to secure the distribution of medical information using Wax.  ...  While the X.509 philosophy may be suitable for many electronic commerce applications, signatures on which we may have to rely for many years -such as those on books and contractsappear to require a different  ...  Acknowledgements Václav Matyáš Jr. would like to thank the Royal Society for supporting his research through a Postdoctoral Fellowship.  ... 
doi:10.1007/bfb0028155 fatcat:nx7j7fmmfzf2bhzf5gn6ymptj4

Book Theft and Library Security Systems, 1978-79 (Book Review)

James Michalko
1978 College and Research Libraries  
Book Theft and Library Security Systems, 1978-79. White Plains, N.Y.: Knowledge Industry Publications, 1978. 128p. $24.50. LC 77-25284. ISBN 0-914236-14-8 .  ...  The major section on electronic security systems effectively answers questions that buyers are likely to ask-such as, how the systems work, what they cost, what can be protected, and what special features  ... 
doi:10.5860/crl_39_05_409 fatcat:uwuc7exkzfawdp65jbd6sm43hq

From digital audiobook to secure digital multimedia-book

Lavinia Egidi, Marco Furini
2006 Computers in Entertainment  
Multimedia contents are protected by a security system that ensures perfect audio quality and full access to multimedia contents only to a legal user.  ...  A distribution architecture and a player that use the proposed mechanism are also presented.  ...  ; (ii) design of a security mechanism that protects the MMCs, ensuring the rights of vendors and guaranteeing to an honest user the freedom offered by an open format; (iii) a distribution architecture  ... 
doi:10.1145/1146816.1146825 fatcat:w7amah3qcvep5pgf2lsi43kedu

Who Should Read This Book [chapter]

2016 Securing the Outdoor Construction Site  
cause of crashes and security holes.  ...  because this is a book about the art of Unix programming.  ...  It allows redistribution of modified binaries, but restricts redistribution of modified sources in ways intended to protect the interests of the authors and the free-software community.  ... 
doi:10.1016/b978-0-12-802383-9.00019-8 fatcat:5cxlhe2k4fbjzfwouwq6qa7iqe

Urban Crime and Security [chapter]

Tao Cheng, Tongxin Chen
2021 The Urban Book Series  
Finally, a manifesto of data-driven policing is proposed, with its practical demand for efficient security strategies and the development of big data technologies.  ...  This chapter reviews the progress made in this topic from historic criminology to data-driven policing. It first reviews the broad implications of urban security and its implementation in practice.  ...  Section 14.3 presents the concerns and theories in urban security which is devoted to reducing the urban crime problems and protecting citizenship.  ... 
doi:10.1007/978-981-15-8983-6_14 fatcat:uioa2i7hk5hvvpk64ahd6dw7ta

Book review "Trade Perspectives in the Context of Safety, Security, Privacy and Loyalty"

Katija Vojvodić
2018 Ekonomski Vjesnik  
As a result, Chapter 6 seeks to address some of the most important issues of security, legal protection and ethical issues in international trade.  ...  The existing literature on distributive and international trade has been recently enriched by the publication entitled Trade Perspectives in the Context of Safety, Security, Privacy and Loyalty edited  ... 
doaj:39548e18e58948a2a32731f134dcc595 fatcat:xt3qlktu7zb2bekuusqjcibs6i

False Security

Laylin K. James, Bernard J. Reis
1938 The University of Chicago Law Review  
BOOK REVIEWS 539 book. However, in spite of such shortcomings, the book marks a step forward in the development of a new type of textbook.  ...  Consequently the average person, without knowledge of the facts, is duped and his savings evaporated through the pur- chase of worthless securities.  ... 
doi:10.2307/1596521 fatcat:czhgzw5uzfac3iq4z6ntx5tmr4

Health Security in the White Book on National Security of the Republic of Poland – a Review of Provisions

Mirosław Skarżyński
2014 Przegląd Strategiczny  
Health security in the White Book on National Security of the Republic of Poland...  ...  in the White Book on National Security of the Republic of Poland...  ... 
doi:10.14746/ps.2014.1.31 fatcat:7m2y2ytt5nf7pbsfcyb3r4nqb4

Computer Security Subsystem Interpretation of The Trusted Computer System Evaluation Criteria [chapter]

1985 The 'Orange Book' Series  
features are designed with full knowledge of interfaces and host system support.  ...  DISTRIBUTION/AVAILABILITY OF ABSTRACT UNCLASSIFIED/UNLIMITED SAME AS RPT. X DTIC USERS 21. ABSTRACT SECURITY CLASSIFICATION UNCLASSIFIED 22a. NAME OF RESPONSIBLE INDIVIDUAL Michael W. Hale 22b.  ...  For most cases, the SRP encompasses the entire subsystem. Subsystem -See "computer security subsystem." System -The combination of the protected system and the computer security subsystem.  ... 
doi:10.1007/978-1-349-12020-8_11 fatcat:ltkvdwhomzhjpmijze452hbcny

Book Reviews

Mubashir Husain Rehmani
2020 IEEE Communications Magazine  
This book on Blockchain for distributed systems security is one of the timely books available on this topic.  ...  This book on Blockchain for distributed systems security is one of the timely books available on this topic.  ... 
doi:10.1109/mcom.2020.9141184 fatcat:7u77bbgnkbd7rdpibffsfdjzzq

Investing in Distressed Securities [chapter]

2011 Corporate Financial Distress and Bankruptcy  
Course Prerequisites • Basic accounting and financial statement analysis • Basic knowledge of fixed-income and equity securities and related mathematics • Basic corporate finance (discount cash flow analysis  ...  courts, vulture investors, distressed debt traders/brokers) to better understand the roles, agendas, and objectives of each of the participants and how they affect investment results.  ...  Altman and Edith Hotchkiss (Wiley, 2005) • Distressed Securities Edward I. Altman (Beard Books, 1999) • Breakups Stuart C.  ... 
doi:10.1002/9781118267806.ch8 fatcat:tg6rljdf2nbrlkzyaep4fynfwa

Computational Intelligence in Cyber Security

Dipankar Dasgupta
2006 2006 IEEE International Conference on Computational Intelligence for Homeland Security and Personal Safety  
The use of these techniques allowed building efficient and robust decision support modules, providing cross-linking solutions to different cyber security applications.  ...  With the proliferation of complex distributed and Internet computing, information security and privacy become very important.  ...  the area of computer security.  ... 
doi:10.1109/cihsps.2006.313289 fatcat:t5wir63zwbedrdz2o5cmlwy6ei

Computer security

Peter S. Browne
1976 Proceedings of the June 7-10, 1976, national computer conference and exposition on - AFIPS '76  
Current data processing literature is a rich source of information. Articles and papers regarding security, design of software protection, operational practices and auditing number in the thousands.  ...  regarding computer vulnerabilities, the discipline of computer security is achieving independent recognition.  ...  A widely distributed monograph on data security: it helped bring attention to some of the needs and the problems. 76.  ... 
doi:10.1145/1499799.1499809 dblp:conf/afips/Browne76 fatcat:buzswfbn55dyhm5ujf44aeklyy

Computer security

Peter S. Browne
1972 ACM SIGMIS Database the DATABASE for Advances in Information Systems  
Current data processing literature is a rich source of information. Articles and papers regarding security, design of software protection, operational practices and auditing number in the thousands.  ...  regarding computer vulnerabilities, the discipline of computer security is achieving independent recognition.  ...  A widely distributed monograph on data security: it helped bring attention to some of the needs and the problems. 76.  ... 
doi:10.1145/1017536.1017537 fatcat:msh63pxnmvcezc3maea4aak7qa

A Secure TFTP Protocol with Security Proofs [article]

Mohd Anuar Mat Isa, Habibah Hashim, Syed Farid Syed Adnan, Jamalul-lail Ab Manan, Ramlan Mahmod
2014 arXiv   pre-print
We also present the security reduction of SSW-ARQ protocol from Cramer-Shoup encryption scheme and fixed-time side channel security.  ...  The target implementation of secure TFTP is for embedded devices such as Wi-Fi Access Points (AP) and remote Base Stations (BS).  ...  For the Security Claim 2.2), we can use a similar experiment that is used for Cramer-Shoup encryption scheme except that an adversary are given knowledge of runtime performance of cryptographic computation  ... 
arXiv:1409.0060v1 fatcat:2mmkf6zx2zfyfbn7bxnfwvm2lq
« Previous Showing results 1 — 15 out of 192,894 results