Information Security

@inproceedings{Crescenzo2001InformationS,
  title={Information Security},
  author={Giovanni Di Crescenzo and Olga Kornievskaia},
  booktitle={Lecture Notes in Computer Science},
  year={2001}
}
Information technology enables more accurate, reliable, and faster information processing with information more readily available to administration, faculty, staff, and students. However, information technology has also brought new administrative concerns, challenges, and responsibilities. Information assets must be protected from natural, technological and human hazards. Policies and practices must be established to ensure that hazards are reduced or their effects minimized. 

From This Paper

Figures and tables from this paper.

References

Publications referenced by this paper.
Showing 1-10 of 22 references

Safely reducing the number of iterations in Montgomery modular multiplication

  • C. D. Walter
  • Efficient Implementation of Elliptic Curve…
  • 2001
Highly Influential
4 Excerpts

The AES Cipher Algorithm and Its Use with IPSec

  • S. Frankel, S. Kelly, R. Glenn
  • Network Working Group Internet Draft, November
  • 2000
Highly Influential
9 Excerpts