Skip to search formSkip to main contentSkip to account menu

Information security

Known as: CIA (disambiguation), INFOSEC, CIA criteria 
Information security, sometimes shortened to InfoSec, is the practice of defending information from unauthorized access, use, disclosure, disruption… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2016
Review
2016
The applications of compressive sensing (CS) in the field of information security have captured a great deal of researchers… 
Highly Cited
2015
Highly Cited
2015
Non-malleable codes, introduced by Dziembowski, Pietrzak and Wichs [DPW10], provide a useful message integrity guarantee in… 
Highly Cited
2012
Highly Cited
2012
In this paper, we introduce the first fully implemented two way authentication security scheme for the Internet of Things (IoT… 
Review
2012
Review
2012
Purpose – The auto ancillary industry in India has witnessed huge capacity expansion and modernization due to entry of foreign… 
Highly Cited
2010
Highly Cited
2010
Purpose – The purpose of this paper is to demonstrate that records management frameworks need to be risk based, flexible and… 
Highly Cited
2006
Highly Cited
2006
There is a strong need for information security education, which stems from the pervasiveness of information technology in… 
Review
2005
Review
2005
Expanded into two volumes, the Second Edition of Springers Encyclopedia of Cryptography and Security brings the latest and most… 
Highly Cited
2005
Highly Cited
2005
Particle swarm optimization (PSO) is an alternative population-based evolutionary computation technique. It has been shown to be… 
Highly Cited
2004
Highly Cited
2004
This paper studies the recent transformation in the employment and operations of ‘Special Operations Forces’ (SOF). In this paper… 
Highly Cited
2003
Highly Cited
2003
WS-Security describes enhancements to SOAP messaging to provide quality of protection through message integrity, message…