Information Security

@inproceedings{Crescenzo2001InformationS,
  title={Information Security},
  author={Giovanni Di Crescenzo and Olga Kornievskaia},
  booktitle={Lecture Notes in Computer Science},
  year={2001}
}
  • Giovanni Di Crescenzo, Olga Kornievskaia
  • Published in
    Lecture Notes in Computer…
    2001
  • Computer Science
  • Workstation Requirements • Complex Passwords (8-16 characters, Upper/Lower, Numerical or Special character) • VCU approved antivirus system • Automatic lock of workstation after 10 minutes of inactivity. • Disable unneeded local accounts • Automatic Updates to be enabled (daily check) and Windows Firewall enabled; only VCU supported PC Operating Systems with most current patch installed • Maintain current patch level for all desktop/supported applications • The “remember passwords feature” in… CONTINUE READING

    Create an AI-powered research feed to stay up to date with new papers like this posted to ArXiv

    References

    Publications referenced by this paper.
    SHOWING 1-10 OF 22 REFERENCES

    Safely reducing the number of iterations in Montgomery modular multiplication

    • C. D. Walter
    • Efficient Implementation of Elliptic Curve Cryptosystems
    • 2001
    VIEW 4 EXCERPTS
    HIGHLY INFLUENTIAL

    The H essian form of an elliptic curve

    • N. P. Smart
    • In C. K. Koç and D. Naccache and C. Paar, editors, Proceedings of the Third Workshop on Cryptographic Hardware and Embedded Systems - CHES ’01,
    • 2001
    VIEW 4 EXCERPTS
    HIGHLY INFLUENTIAL

    Comparison of the Hardware Performance of the AES Candidates Using Reconfigurable Hardware

    VIEW 7 EXCERPTS
    HIGHLY INFLUENTIAL

    Fast Implementation of Elliptic Curve Arithmetic in GF(pn)

    VIEW 7 EXCERPTS
    HIGHLY INFLUENTIAL

    The AES Cipher Algorithm and Its Use with IPSec

    • S. Frankel, S. Kelly, R. Glenn
    • Network Working Group Internet Draft, November
    • 2000
    VIEW 9 EXCERPTS
    HIGHLY INFLUENTIAL

    recommended elliptic curves for federal government use

    • NIST. NIST Documents
    • July
    • 1999
    VIEW 4 EXCERPTS
    HIGHLY INFLUENTIAL