Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,588,502 papers from all fields of science
Search
Sign In
Create Free Account
Information security
Known as:
CIA (disambiguation)
, INFOSEC
, CIA criteria
Expand
Information security, sometimes shortened to InfoSec, is the practice of defending information from unauthorized access, use, disclosure, disruption…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Application security
BLADE
Block cipher mode of operation
Ciphertext indistinguishability
Expand
Broader (1)
Data security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Bio-Inspired Cryptographic Techniques in Information Management Applications
L. Ogiela
,
M. Ogiela
International Conference on Advanced Information…
2016
Corpus ID: 16037123
This paper will present new possibilities of information sharing with the use of biometric techniques. Various biometric…
Expand
Review
2015
Review
2015
Mobile Botnet Attacks - an Emerging Threat: Classification, Review and Open Issues
Ahmad Karim
,
Syed Adeel Ali Shah
,
R. Salleh
,
Muhammad Arif
,
R. M. Noor
,
Shahaboddin Shamshirband
KSII Transactions on Internet and Information…
2015
Corpus ID: 18366581
The rapid development of smartphone technologies have resulted in the evolution of mobile botnets. The implications of botnets…
Expand
2013
2013
Iris recognition based on bidimensional empirical mode decomposition and fractal dimension
Wei-Kuei Chen
,
Jen-Chun Lee
,
W. Han
,
Chih-Kuang Shih
,
Ko-Chin Chang
Information Sciences
2013
Corpus ID: 34087555
2009
2009
A Novel Processor Architecture for McEliece Cryptosystem and FPGA Platforms
Abdulhadi Shoufan
,
Thorsten Wink
,
Gregor Molter
,
S. Huss
,
Falko Strentzke
IEEE International Conference on Application…
2009
Corpus ID: 12225853
McEliece scheme represents a code-based public-key cryptosystem. So far, this cryptosystem was not employed because of efficiency…
Expand
Highly Cited
2008
Highly Cited
2008
A Minimalist Mutual Authentication Protocol for RFID System & BAN Logic Analysis
Qingling Cai
,
Zhan Yiju
,
Yonghua Wang
ISECS International Colloquium on Computing…
2008
Corpus ID: 5546972
This paper proposes a new security protocol with satisfying the lightweight requirements of the security of RFID system - A…
Expand
2006
2006
Security and Privacy on Authentication Protocol for Low-cost RFID
Yong-Zhen Li
,
Young-Bok Cho
,
Nam-Kyoung Um
,
Sang Ho Lee
International Conference on Computational…
2006
Corpus ID: 18891774
The radio frequency identification (RFID) is an automatic identification system, relying on storing and remotely retrieving data…
Expand
2005
2005
Hoc Networks
2005
Corpus ID: 10331725
2005
2005
A novel intrusion detection method based on clonal selection clustering algorithm
Ji-Qing Xian
,
Fenghua Lang
,
X. Tang
International Conference on Machine Learning and…
2005
Corpus ID: 44294748
This paper presents a novel unsupervised fuzzy clustering method based on clonal selection algorithm for anomaly detection in…
Expand
Highly Cited
2003
Highly Cited
2003
Web Services Security (WS-Security)
Bob Atkinson
2003
Corpus ID: 166854042
WS-Security describes enhancements to SOAP messaging to provide quality of protection through message integrity, message…
Expand
Highly Cited
1991
Highly Cited
1991
Information Security Handbook
W. Caelli
,
D. Longley
,
M. Shain
1991
Corpus ID: 166244603
Security management and policy risk management contingency planning and damage avoidance information security and the law…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE