Secure environment

In computing, a secure environment is any system which implements the controlled storage and use of information. In the event of computing data loss… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
The Internet is used by a large proportion of the population, but unfortunately their education regarding the usage of the… (More)
  • figure 1
  • figure 20
  • figure 22
  • figure 21
Is this relevant?
2013
2013
We propose an architecture that enables the creation and management of multiple, concurrent secure execution environments on… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2013
2013
Dynamic loading is widely used in designing and implementing software. Its benefits include modularity and generic interfaces for… (More)
  • figure 3.2
  • figure 3.1
  • figure 5.1
  • table 1
  • table 2
Is this relevant?
2011
2011
Previous Web access authentication systems often use either the Web or the Mobile channel individually to confirm the claimed… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2005
2005
Superimposing electronic signing data on a signed electronic contract usually involves a large number of complex manual steps… (More)
  • figure 2
  • figure 6
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Human authentication is the security task whose job is to limit access to physical locations or computer network only to those… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2004
2004
Summary form only given. Cryptographic algorithms provide encryption for millions of sensitive financial, government, and private… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • table 2
Is this relevant?
1999
1999
Software systems are becoming heterogeneous: instead of a small number of large programs from well-established sources, a user’s… (More)
  • figure 1
Is this relevant?
1997
1997
Bugs in network application program can be exploited to compromise the system on which the application is running. When running… (More)
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
1996
Highly Cited
1996
Many popular programs, such as Netscape, use untrusted helper applications to process data from the network. Unfortunately, the… (More)
  • figure 1
Is this relevant?