Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 224,708,530 papers from all fields of science
Search
Sign In
Create Free Account
Computer security
Known as:
Computer security and identity theft
, Compsec
, Cyber security expert
Expand
Computer security, also known as cyber security or IT security, is the protection of information systems from theft or damage to the hardware, the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Aircraft Communications Addressing and Reporting System
Anti-worm
Arbitrary code execution
Backup
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2013
Highly Cited
2013
Security Concerns in Cloud Computing
Issa M. Khalil
,
Abdallah Khreishah
,
S. Bouktif
,
Azeem Ahmad
International Conference on Information…
2013
Corpus ID: 10738480
The rate of threats against IT systems is directly proportional to the rate of growing technology. The emergence of new…
Expand
Highly Cited
2012
Highly Cited
2012
Feature Selection for Improved Phishing Detection
Ram B. Basnet
,
A. Sung
,
Qingzhong Liu
International Conference on Industrial…
2012
Corpus ID: 639853
Phishing --- a hotbed of multibillion dollar underground economy --- has become an important cybersecurity problem. The…
Expand
Highly Cited
2011
Highly Cited
2011
After-the-Fact Leakage in Public-Key Encryption
S. Halevi
,
Huijia Lin
IACR Cryptology ePrint Archive
2011
Corpus ID: 17573294
What does it mean for an encryption scheme to be leakage-resilient? Prior formulations require that the scheme remains…
Expand
Highly Cited
2005
Highly Cited
2005
The security of VANETs
M. Raya
,
J. Hubaux
International Workshop on VehiculAr Inter…
2005
Corpus ID: 6749562
In this work, we address the security of VANETs. We provide a detailed threat analysis and devise an appropriate security…
Expand
Highly Cited
2004
Highly Cited
2004
Personalised cryptographic key generation based on FaceHashing
A. Teoh
,
D. Ngo
,
A. Goh
Computers & security
2004
Corpus ID: 8286447
Highly Cited
2004
Highly Cited
2004
An introduction to access security in UMTS
G. M. Køien
IEEE wireless communications
2004
Corpus ID: 1867959
The first generation of cellular mobile communications systems contained few if any security measures to protect the system…
Expand
Highly Cited
2004
Highly Cited
2004
A smart card-based remote scheme for password authentication in multi-server Internet services
Woei-Jiunn Tsaur
,
Chia-Chun Wu
,
Wei-Bin Lee
Comput. Stand. Interfaces
2004
Corpus ID: 5067660
Highly Cited
2004
Highly Cited
2004
A steganographic scheme for secure communications based on the chaos and euler Theorem
D. Lou
,
Chia-Hung Sung
IEEE transactions on multimedia
2004
Corpus ID: 12770859
Steganography has been proposed as a methodology for transmitting messages through innocuous covers to conceal their existence…
Expand
Highly Cited
2003
Highly Cited
2003
Cryptanalysis of a modified remote user authentication scheme using smart cards
K. Leung
,
Lee-Ming Cheng
,
A. Fong
,
Chi-Kwong Chan
IEEE Trans. Consumer Electron.
2003
Corpus ID: 206631417
In this paper, the security of a modified remote user authentication scheme proposed by Shen, Lin, and Hwang is analyzed. We show…
Expand
Review
2002
Review
2002
Assessing Security-Critical Energy-Efficient Sensor Networks
Yee Wei Law
,
S. Dulman
,
S. Etalle
,
P. Havinga
2002
Corpus ID: 16172790
In the EYES project (http://eyes.eu.org), we are investigating self-organizing, collaborative, energy-efficient sensor networks…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE