Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,531,085 papers from all fields of science
Search
Sign In
Create Free Account
Information security
Known as:
CIA (disambiguation)
, INFOSEC
, CIA criteria
Expand
Information security, sometimes shortened to InfoSec, is the practice of defending information from unauthorized access, use, disclosure, disruption…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Application security
BLADE
Block cipher mode of operation
Ciphertext indistinguishability
Expand
Broader (1)
Data security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2015
Review
2015
Mobile Botnet Attacks - an Emerging Threat: Classification, Review and Open Issues
Ahmad Karim
,
Syed Adeel Ali Shah
,
R. Salleh
,
Muhammad Arif
,
R. M. Noor
,
Shahaboddin Shamshirband
KSII Transactions on Internet and Information…
2015
Corpus ID: 18366581
The rapid development of smartphone technologies have resulted in the evolution of mobile botnets. The implications of botnets…
Expand
Review
2011
Review
2011
Review on Binary Image Steganography and Watermarking
Mrs. Gyankamal
,
J. Chhajed
,
Ms. Krupali
,
V. Ms
,
S. Trupti
,
Kulkarni
2011
Corpus ID: 13551448
In this paper we have reviewed and analyzed different watermarking and steganography techniques. This is based on image…
Expand
2010
2010
The Research of Internet of Things' Supporting Technologies Which Face the Logistics Industry
Yuqiang Chen
,
Jianlan Guo
,
Xuanzi Hu
International Conference on Computational…
2010
Corpus ID: 16070175
This paper base on the application of the Internet of things in the logistics industry as the breakthrough point, to investigate…
Expand
2007
2007
Modern Public Information Technology Systems: Issues and Challenges
G. Garson
2007
Corpus ID: 153104686
The nature of governance is rapidly changing, due to new technologies which expand public sector capabilities. Modern Public…
Expand
2006
2006
The Design and Use of Interactive Visualization Applets for Teaching Ciphers
Dino Schweitzer
,
Leemon Baird
IEEE Information Assurance Workshop
2006
Corpus ID: 17672802
Cryptography is a fundamental topic in an information assurance curriculum. Students should understand the basic concepts and…
Expand
2005
2005
Hoc Networks
2005
Corpus ID: 10331725
2004
2004
VAWA's Unfinished Business: The Immigrant Women Who Fall through the Cracks
S. Wood
2004
Corpus ID: 141936358
I. INTRODUCTION: DOMESTIC VIOLENCE IN LATIN AMERICAN IMMIGRANT COMMUNITIES Domestic violence is a crime that does not recognize…
Expand
Highly Cited
2003
Highly Cited
2003
Web Services Security (WS-Security)
Bob Atkinson
2003
Corpus ID: 166854042
WS-Security describes enhancements to SOAP messaging to provide quality of protection through message integrity, message…
Expand
1996
1996
Public key cryptography
S. Garfinkel
1996
Corpus ID: 62619295
The RSA algorithm can be used for a kind of unforgeable digital signature. In this application, the secret key is used to encrypt…
Expand
1993
1993
A Fast and General Implementation of Mach IPC in a Network
H. Orman
,
S. O'Malley
,
E. Menze
,
L. Peterson
,
R. Schroeppel
USENIX MACH Symposium
1993
Corpus ID: 18597494
This paper describes an implementation of the Mach IPC abstraction on a network. Our implementation, called Mach NetIPC, is done…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE