Skip to search formSkip to main contentSkip to account menu

Computer security

Known as: Computer security and identity theft, Compsec, Cyber security expert 
Computer security, also known as cyber security or IT security, is the protection of information systems from theft or damage to the hardware, the… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2011
Highly Cited
2011
What does it mean for an encryption scheme to be leakage-resilient? Prior formulations require that the scheme remains… 
Highly Cited
2011
Highly Cited
2011
  • F. Stajano
  • 2011
  • Corpus ID: 16190648
From a usability viewpoint, passwords and PINs have reached the end of their useful life. Even though they are convenient for… 
Highly Cited
2009
Highly Cited
2009
This paper provides a comprehensive idea about the pattern discovery of web usage mining. Web site designers should have clear… 
Highly Cited
2007
Highly Cited
2007
Given a set of model graphs D and a query graph q, containment search aims to find all model graphs g e D such that q contains g… 
Highly Cited
2005
Highly Cited
2005
In this work, we address the security of VANETs. We provide a detailed threat analysis and devise an appropriate security… 
Highly Cited
2004
Highly Cited
2004
The first generation of cellular mobile communications systems contained few if any security measures to protect the system… 
Highly Cited
2004
Highly Cited
2004
Steganography has been proposed as a methodology for transmitting messages through innocuous covers to conceal their existence… 
Highly Cited
2004
Highly Cited
2004
Following in the steps of the gas industry, the traditional paradigm of the vertically integrated electric utility structure has… 
Highly Cited
2003
Highly Cited
2003
In this paper, the security of a modified remote user authentication scheme proposed by Shen, Lin, and Hwang is analyzed. We show…