Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,084,873 papers from all fields of science
Search
Sign In
Create Free Account
Computer security
Known as:
Computer security and identity theft
, Compsec
, Cyber security expert
Expand
Computer security, also known as cyber security or IT security, is the protection of information systems from theft or damage to the hardware, the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Aircraft Communications Addressing and Reporting System
Anti-worm
Arbitrary code execution
Backup
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2013
Highly Cited
2013
Security Concerns in Cloud Computing
Issa M. Khalil
,
Abdallah Khreishah
,
S. Bouktif
,
Azeem Ahmad
International Conference on Information…
2013
Corpus ID: 10738480
The rate of threats against IT systems is directly proportional to the rate of growing technology. The emergence of new…
Expand
Highly Cited
2011
Highly Cited
2011
After-the-Fact Leakage in Public-Key Encryption
S. Halevi
,
Huijia Lin
IACR Cryptology ePrint Archive
2011
Corpus ID: 17573294
What does it mean for an encryption scheme to be leakage-resilient? Prior formulations require that the scheme remains…
Expand
Highly Cited
2005
Highly Cited
2005
The security of VANETs
M. Raya
,
J. Hubaux
International Workshop on VehiculAr Inter…
2005
Corpus ID: 6749562
In this work, we address the security of VANETs. We provide a detailed threat analysis and devise an appropriate security…
Expand
Highly Cited
2004
Highly Cited
2004
Personalised cryptographic key generation based on FaceHashing
A. Teoh
,
D. Ngo
,
A. Goh
Computers & security
2004
Corpus ID: 8286447
Highly Cited
2004
Highly Cited
2004
An introduction to access security in UMTS
G. M. Køien
IEEE wireless communications
2004
Corpus ID: 1867959
The first generation of cellular mobile communications systems contained few if any security measures to protect the system…
Expand
Highly Cited
2004
Highly Cited
2004
A smart card-based remote scheme for password authentication in multi-server Internet services
Woei-Jiunn Tsaur
,
Chia-Chun Wu
,
Wei-Bin Lee
Comput. Stand. Interfaces
2004
Corpus ID: 5067660
Highly Cited
2004
Highly Cited
2004
A steganographic scheme for secure communications based on the chaos and euler Theorem
D. Lou
,
Chia-Hung Sung
IEEE transactions on multimedia
2004
Corpus ID: 12770859
Steganography has been proposed as a methodology for transmitting messages through innocuous covers to conceal their existence…
Expand
Highly Cited
2004
Highly Cited
2004
System impact study for the interconnection of wind generation and utility system
C. Chompoo-Inwai
,
Weijen Lee
,
P. Fuangfoo
,
M. Williams
,
J. Liao
Conference, IEEE Industrial and Commercial Power…
2004
Corpus ID: 62807905
Following in the steps of the gas industry, the traditional paradigm of the vertically integrated electric utility structure has…
Expand
Highly Cited
2003
Highly Cited
2003
Cryptanalysis of a modified remote user authentication scheme using smart cards
K. Leung
,
Lee-Ming Cheng
,
A. Fong
,
Chi-Kwong Chan
IEEE Trans. Consumer Electron.
2003
Corpus ID: 206631417
In this paper, the security of a modified remote user authentication scheme proposed by Shen, Lin, and Hwang is analyzed. We show…
Expand
Highly Cited
1998
Highly Cited
1998
Authentication for Mobile Agents
S. Berkovits
,
J. Guttman
,
Vipin Swarup
Mobile Agents and Security
1998
Corpus ID: 13987376
In mobile agent systems, program code together with some process state can autonomously migrate to new hosts. Despite its many…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE