Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 210,064,140 papers from all fields of science
Search
Sign In
Create Free Account
Security Target
Common Criteria for Information Technology Security Evaluation, version 3.1 Part 1 (Called “CC 3.1” or “CC”) defines the Security Target (ST) as an…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
6 relations
Common Criteria
Common Criteria Testing Laboratory
Evaluation Assurance Level
Information assurance
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Strongly Secure Authenticated Key Exchange from Supersingular Isogeny
Xiu Xu
,
Haiyang Xue
,
Kunpeng Wang
,
Song Tian
,
Bei Liang
,
Wei Yu
IACR Cryptology ePrint Archive
2018
Corpus ID: 52164448
This paper aims to address the open problem, namely, to find new techniques to design and prove security of supersingular isogeny…
Expand
2013
2013
Security In the Internet of Things Based on RFID: Issues and Current Countermeasures
Xiao Nie
,
X. Zhong
2013
Corpus ID: 56023577
In recent years, the internet of things (IOT) has been a focus of research. RFID (Radio Frequency Identification) as a core…
Expand
2010
2010
FOOD SECURITY IN SOUTH AFRICA By
M. Baiphethi
,
Demetre
,
+5 authors
V. Reddy
2010
Corpus ID: 54739379
Review
2009
Review
2009
The status of household food security targets in South Africa
F. T. Jacobs
2009
Corpus ID: 15830202
Abstract This article investigates the conceptual and methodological challenges to develop a set of baseline indicators for South…
Expand
2008
2008
Secure Mobile Payment via Trusted Computing
Qi Li
,
Xinwen Zhang
,
J. Seifert
,
H. Zhong
Third Asia-Pacific Trusted Infrastructure…
2008
Corpus ID: 6640942
Mobile payment (m-payment) received significant attention because it enables an easy payment mechanism and becomes an important…
Expand
2005
2005
Author version of:
Jane Medefesser
,
Public Release
2005
Corpus ID: 43165972
TERTIARY educators generally agree that student plagiarism is on the increase. Where disagreement occurs is over the cause…
Expand
2000
2000
Making Sense of Smart Card Security Certifications
Jason Reid
,
M. Looi
Smart Card Research and Advanced Application…
2000
Corpus ID: 17372318
Manufacturers and producers of smart card systems are all beginning to climb on the certification bandwagon. In this paper, we…
Expand
2000
2000
Network Pump (NP) Security Target
A. Moore
2000
Corpus ID: 108805580
Abstract : This paper describes the security requirements and top level design of a network security device called the Network…
Expand
1996
1996
NetWare 4 as an example of role-based access control
J. Epstein
,
R. Sandhu
ACM Workshop on Role-Based Access Control
1996
Corpus ID: 30333141
In [SAND96a], the second author describes a taxonomy of role-based access control (RBAC) models, divided into four classes shown…
Expand
1978
1978
AID
B. Sandler
1978
Corpus ID: 220206922
One key source of financing for development, especially for low-income countries, is concessional official development assistance…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE