Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,358,674 papers from all fields of science
Search
Sign In
Create Free Account
Norton Internet Security
Known as:
NIS09
, Norton Internet Security (English)
, NortonInternetSecurity
Expand
Norton Internet Security, developed by Symantec Corporation, is a computer program that provides malware prevention and removal during a subscription…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
"Classic" Mac OS
Application programming interface
Benchmark (computing)
CNET
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Study on the Distribution Optimization of Emergency Material Reserves
Xiangjing Mu
,
Jikun Guo
,
Xianwu Sun
,
Jun Dai
2016
Corpus ID: 13882091
Emergency material reserve is the reserve activity of a nation made in advance for securing the supply of emergency materials…
Expand
2013
2013
The New Safety Net? Supplemental Security Income after Welfare Reform
L. Schmidt
2013
Corpus ID: 153137015
Over the past twenty years, the Supplemental Security Income Program (SSI), which provides federally-funded income support for…
Expand
2013
2013
Performance evaluation of user applications in the ITS scenario: An analytical assessment of the NeMHIP
N. Toledo
,
J. Bonnin
,
M. Higuero
Journal of Network and Computer Applications
2013
Corpus ID: 206257112
2012
2012
On the Foundations of Quantum Key Distribution - Reply to Renner and Beyond
H. Yuen
2012
Corpus ID: 55182001
In a recent note (arXiv:1209.2423) Renner claims that the criticisms of Hirota and Yuen on the security foundation of quantum key…
Expand
2012
2012
Analisis Perbandingan Kaspersky Internet Security 2012 dan Norton Internet Security 2012
Ratnawati Sandini
2012
Corpus ID: 115184593
Ratnawati Sandini.15109738 Analisis Perbandingan Norton Internet Security 2012 dan Kaspersky Internet Security 2012 PI, Jurusan…
Expand
2012
2012
A Novel Secure Authenticated Key Exchange Protocol for Wireless Sensor Networks
T. Barakat
2012
Corpus ID: 212497122
Summary Recently, Eun-Jun et al. 's proposed an improvement of the authentication key exchange protocol. In their protocol, they…
Expand
2010
2010
Security of quantum key distribution source
Eivind Sjøtun Simonsen
2010
Corpus ID: 59470694
Cryptography has begun its journey into the field of quantum information theory. Classical cryptography has shown weaknesses…
Expand
2009
2009
Software security metric identification framework (SSM)
S. Chandra
,
R. Khan
ICAC3 '09
2009
Corpus ID: 16557284
Security improvement is the foremost concern for both industry professional and academician. Measurement is one of the most…
Expand
2008
2008
An aspect-oriented framework for systematic security hardening of software
A. Mourad
2008
Corpus ID: 27202148
In this thesis, we address the problems related to the security hardening of open source software. Accordingly, we first propose…
Expand
1998
1998
Security pitfalls in cryptographic design
B. Schneier
Information Management & Computer Security
1998
Corpus ID: 29285597
Highlights the common security pitfalls in cryptographic design. States that even strong encryption algorithms can be…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE