Skip to search formSkip to main contentSkip to account menu

Security Target

Common Criteria for Information Technology Security Evaluation, version 3.1 Part 1 (Called “CC 3.1” or “CC”) defines the Security Target (ST) as an… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
This paper aims to address the open problem, namely, to find new techniques to design and prove security of supersingular isogeny… 
2013
2013
In recent years, the internet of things (IOT) has been a focus of research. RFID (Radio Frequency Identification) as a core… 
2010
2010
Review
2009
Review
2009
Abstract This article investigates the conceptual and methodological challenges to develop a set of baseline indicators for South… 
2008
2008
Mobile payment (m-payment) received significant attention because it enables an easy payment mechanism and becomes an important… 
2005
2005
TERTIARY educators generally agree that student plagiarism is on the increase. Where disagreement occurs is over the cause… 
2000
2000
  • Jason ReidM. Looi
  • Smart Card Research and Advanced Application…
  • 2000
  • Corpus ID: 17372318
Manufacturers and producers of smart card systems are all beginning to climb on the certification bandwagon. In this paper, we… 
2000
2000
Abstract : This paper describes the security requirements and top level design of a network security device called the Network… 
1996
1996
In [SAND96a], the second author describes a taxonomy of role-based access control (RBAC) models, divided into four classes shown… 
1978
1978
One key source of financing for development, especially for low-income countries, is concessional official development assistance…