Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Secure by default

Security by default, in software, means that the default configuration settings are the most secure settings possible, which are not necessarily the… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
At EUROCRYPT 2004, Naccache et al. showed that the projective coordinates representation of the resulting point of an elliptic… Expand
  • table 1
  • figure 1
  • table 2
Is this relevant?
2019
2019
Seeking to increase awareness of WPA2 Enterprise network security technology flaws and reduce risk to users. 
Is this relevant?
Review
2018
Review
2018
SM2 is a public key cryptography suite originating from Chinese standards, including digital signatures and public key encryption… Expand
  • figure 1
  • figure 2
  • figure 5
  • figure 3
  • figure 4
Is this relevant?
2018
2018
This paper presents a new methodology using software reflection to prevent, detect, and mitigate internal attacks to a running… Expand
Is this relevant?
2016
2016
 
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2015
2015
At a time where the available Internet Protocol version 4 (IPv4) address pools are running out, still too many Internet Service… Expand
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2015
2015
The Eyes of Things (EoT) EU H2020 project envisages a computer vision platform that can be used both standalone and embedded into… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table I
Is this relevant?
2014
2014
Pervasive monitoring on the Internet is enabled by the lack of general, fundamental security. In his presentation at the 88th… Expand
Is this relevant?
2013
2013
  • 2013
  • Corpus ID: 41206469
Association Française pour le Nommage Internet en Coopération | www.afnic.fr | contact@afnic.fr | Twitter : @AFNIC | Facebook… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2008
2008
What are the real security issues for a wireless sensor network (WSN) intended to monitor the structural health of a suspension… Expand
  • figure 1
  • figure 2
Is this relevant?