Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 221,756,111 papers from all fields of science
Search
Sign In
Create Free Account
Information security
Known as:
CIA (disambiguation)
, INFOSEC
, CIA criteria
Expand
Information security, sometimes shortened to InfoSec, is the practice of defending information from unauthorized access, use, disclosure, disruption…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Application security
BLADE
Block cipher mode of operation
Ciphertext indistinguishability
Expand
Broader (1)
Data security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Physiological Information Leakage: A New Frontier in Health Information Security
A. M. Nia
,
S. Sur-Kolay
,
A. Raghunathan
,
N. Jha
IEEE Transactions on Emerging Topics in Computing
2016
Corpus ID: 16867074
Information security has become an important concern in healthcare systems, owing to the increasing prevalence of medical devices…
Expand
Highly Cited
2012
Highly Cited
2012
A DTLS based end-to-end security architecture for the Internet of Things with two-way authentication
Thomas Kothmayr
,
C. Schmitt
,
W. Hu
,
M. Brünig
,
G. Carle
37th Annual IEEE Conference on Local Computer…
2012
Corpus ID: 8924479
In this paper, we introduce the first fully implemented two way authentication security scheme for the Internet of Things (IoT…
Expand
Highly Cited
2010
Highly Cited
2010
An alignment-free fingerprint cryptosystem based on fuzzy vault scheme
Peng Li
,
Xin Yang
,
Kai Cao
,
Xunqiang Tao
,
Ruifang Wang
,
Jie Tian
Journal of Network and Computer Applications
2010
Corpus ID: 18632015
Highly Cited
2009
Highly Cited
2009
Quantifying Information Leaks in Outbound Web Traffic Kevin Borders
A. Prakash
2009
Corpus ID: 3171866
As the Internet grows and network bandwidth continues to increase, administrators are faced with the task of keeping confidential…
Expand
Highly Cited
2006
Highly Cited
2006
Information Security Risk Analysis: A Pedagogic Model Based on a Teaching Hospital
Sanjay Goel
,
Damira Pon
2006
Corpus ID: 109240918
There is a strong need for information security education, which stems from the pervasiveness of information technology in…
Expand
Review
2005
Review
2005
Preliminary results of the EIP Project
R. Bednarik
,
Giriraj Kumar
,
A. Watchman
,
R. Roberts
2005
Corpus ID: 59584411
The primary rationale of the Early Indian Petroglyphs Project is to investigate claims of the occurrence of Lower Palaeolithic…
Expand
Highly Cited
2005
Highly Cited
2005
A preliminary model of end user sophistication for insider threat prediction in IT systems
G. Magklaras
,
S. Furnell
Computers & security
2005
Corpus ID: 16136345
Highly Cited
2005
Highly Cited
2005
Experimental investigation of security issues in OCDMA: a code-switching scheme
D. Leaird
,
Zhi Jiang
,
A. Weiner
2005
Corpus ID: 18418897
Spectrally phase coded OCDMA with a modulation format based on switching between two codes is demonstrated. The code switching…
Expand
Highly Cited
2004
Highly Cited
2004
The number and the closeness of bank relationships
Joachim von Rheinbaben
,
Martin E. Ruckes
2004
Corpus ID: 54022727
Highly Cited
2003
Highly Cited
2003
Web Services Security (WS-Security)
Bob Atkinson
2003
Corpus ID: 166854042
WS-Security describes enhancements to SOAP messaging to provide quality of protection through message integrity, message…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required