Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,197,505 papers from all fields of science
Search
Sign In
Create Free Account
Computer security
Known as:
Computer security and identity theft
, Compsec
, Cyber security expert
Expand
Computer security, also known as cyber security or IT security, is the protection of information systems from theft or damage to the hardware, the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Aircraft Communications Addressing and Reporting System
Anti-worm
Arbitrary code execution
Backup
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2011
Highly Cited
2011
After-the-Fact Leakage in Public-Key Encryption
S. Halevi
,
Huijia Lin
IACR Cryptology ePrint Archive
2011
Corpus ID: 17573294
What does it mean for an encryption scheme to be leakage-resilient? Prior formulations require that the scheme remains…
Expand
Highly Cited
2011
Highly Cited
2011
Pico: No More Passwords!
F. Stajano
Security Protocols Workshop
2011
Corpus ID: 16190648
From a usability viewpoint, passwords and PINs have reached the end of their useful life. Even though they are convenient for…
Expand
Highly Cited
2009
Highly Cited
2009
Pattern Discovery of Web Usage Mining
Shah Nina
,
Mahmudur Rahman
,
Khairul Islam Bhuiyan
,
K. Ahmed
International Conference on Computer Technology…
2009
Corpus ID: 18430275
This paper provides a comprehensive idea about the pattern discovery of web usage mining. Web site designers should have clear…
Expand
Highly Cited
2007
Highly Cited
2007
Towards Graph Containment Search and Indexing
Cheng Chen
,
Xifeng Yan
,
Philip S. Yu
,
Jiawei Han
,
Dong-Qing Zhang
,
Xiaohui Gu
Very Large Data Bases Conference
2007
Corpus ID: 1803605
Given a set of model graphs D and a query graph q, containment search aims to find all model graphs g e D such that q contains g…
Expand
Highly Cited
2005
Highly Cited
2005
The security of VANETs
M. Raya
,
J. Hubaux
International Workshop on VehiculAr Inter…
2005
Corpus ID: 6749562
In this work, we address the security of VANETs. We provide a detailed threat analysis and devise an appropriate security…
Expand
Highly Cited
2004
Highly Cited
2004
An introduction to access security in UMTS
G. M. Køien
IEEE wireless communications
2004
Corpus ID: 1867959
The first generation of cellular mobile communications systems contained few if any security measures to protect the system…
Expand
Highly Cited
2004
Highly Cited
2004
A smart card-based remote scheme for password authentication in multi-server Internet services
Woei-Jiunn Tsaur
,
Chia-Chun Wu
,
Wei-Bin Lee
Comput. Stand. Interfaces
2004
Corpus ID: 5067660
Highly Cited
2004
Highly Cited
2004
A steganographic scheme for secure communications based on the chaos and euler Theorem
D. Lou
,
Chia-Hung Sung
IEEE transactions on multimedia
2004
Corpus ID: 12770859
Steganography has been proposed as a methodology for transmitting messages through innocuous covers to conceal their existence…
Expand
Highly Cited
2004
Highly Cited
2004
System impact study for the interconnection of wind generation and utility system
C. Chompoo-Inwai
,
Weijen Lee
,
P. Fuangfoo
,
M. Williams
,
J. Liao
Conference, IEEE Industrial and Commercial Power…
2004
Corpus ID: 62807905
Following in the steps of the gas industry, the traditional paradigm of the vertically integrated electric utility structure has…
Expand
Highly Cited
2003
Highly Cited
2003
Cryptanalysis of a modified remote user authentication scheme using smart cards
K. Leung
,
Lee-Ming Cheng
,
A. Fong
,
Chi-Kwong Chan
IEEE Trans. Consumer Electron.
2003
Corpus ID: 206631417
In this paper, the security of a modified remote user authentication scheme proposed by Shen, Lin, and Hwang is analyzed. We show…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE