Добірка наукової літератури з теми "Information security fields"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Information security fields".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Information security fields"
Al Reshan, Mana Saleh. "IoT-based Application of Information Security Triad." International Journal of Interactive Mobile Technologies (iJIM) 15, no. 24 (December 21, 2021): 61–76. http://dx.doi.org/10.3991/ijim.v15i24.27333.
Повний текст джерелаCalkavur, Selda. "Some Public-key Cryptosystems Over Finite Fields." WSEAS TRANSACTIONS ON INFORMATION SCIENCE AND APPLICATIONS 19 (April 26, 2022): 99–104. http://dx.doi.org/10.37394/23209.2022.19.10.
Повний текст джерелаCalkavur, Selda. "Some Public-key Cryptosystems Over Finite Fields." WSEAS TRANSACTIONS ON INFORMATION SCIENCE AND APPLICATIONS 19 (April 26, 2022): 99–104. http://dx.doi.org/10.37394/23209.2022.19.10.
Повний текст джерелаWen, Xiaojun, Genping Wang, Yongzhi Chen, Zhengzhong Yi, Zoe L. Jiang, and Junbin Fang. "Quantum solution for secure information transmission of wearable devices." International Journal of Distributed Sensor Networks 14, no. 5 (May 2018): 155014771877967. http://dx.doi.org/10.1177/1550147718779678.
Повний текст джерелаSzentgáli, Gergely. "Seven Pieces of Advice to Improve Your Information Security." Academic and Applied Research in Military and Public Management Science 17, no. 3 (December 31, 2018): 171–78. http://dx.doi.org/10.32565/aarms.2018.3.12.
Повний текст джерелаAl-Harbi, Ibrahim Sulaiman. "The Information Security in Kingdom Of Saudi Arabia." Ulum Islamiyyah 22 (December 29, 2017): 89–102. http://dx.doi.org/10.33102/uij.vol22no0.12.
Повний текст джерелаTershukov, Dmitry. "Analysis of Modern Information Security Threats." NBI Technologies, no. 3 (January 2019): 6–12. http://dx.doi.org/10.15688/nbit.jvolsu.2018.3.1.
Повний текст джерелаZou, Shihong, Yanhong Xu, Honggang Wang, Zhouzhou Li, Shanzhi Chen, and Bo Hu. "A Survey on Secure Wireless Body Area Networks." Security and Communication Networks 2017 (2017): 1–9. http://dx.doi.org/10.1155/2017/3721234.
Повний текст джерелаXu, Ning, and Dong Mei Zhao. "The Research of Information Security Risk Assessment Method Based on AHP." Advanced Materials Research 187 (February 2011): 575–80. http://dx.doi.org/10.4028/www.scientific.net/amr.187.575.
Повний текст джерелаKompantseva, Larysa. "Gender Perspectives of the Information Security." Information Security of the Person, Society and State, no. 26 (2019): 115–25. http://dx.doi.org/10.51369/2707-7276-2019-2-14.
Повний текст джерелаДисертації з теми "Information security fields"
Kahrs, Katharina. "Share Computing Protocols over Fields and Rings." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2009. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9001.
Повний текст джерелаIn this thesis, we explain linear secret sharing schemes, in particular multiplicative threshold linear secret sharing schemes, over fields and rings in a compact and concise way. We explain two characterisations of linear secret sharing schemes, and in particular, we characterise threshold linear secret sharing schemes. We develop an algorithm to generate all multiplicative $(t+1)$-out-of-$n$ threshold linear secret sharing schemes over a field $mathbb{Z}sb{p}$. For the ring $mathbb{Z}sb{2sp{32}}$, we explain the generation of secret sharing schemes for threshold access structures and prove the non-existence of $(t+1)$-out-of-$n$ threshold linear secret sharing schemes with $n > t+1$.
Gutmann, Peter. "The Design and Verification of a Cryptographic Security Architecture." Thesis, University of Auckland, 2000. http://hdl.handle.net/2292/2310.
Повний текст джерелаNote: Updated version of the thesis now published as Gutmann, P (2004). Cryptographic security architecture: design and verification. New York: Springer. ISBN 9780387953876.
Zhang, Yang. "An empirical study on the relationship between identity-checking steps and perceived trustworthiness in online banking system use : submitted in partial fulfilment of the requirements for the Degree of Master of Information Sciences in Information Technology." Massey University, 2009. http://hdl.handle.net/10179/982.
Повний текст джерелаSteele, Aaron. "Ontological lockdown assessment : a thesis presented in partial fulfilment of the requirements for the degree of Master of Science in Information Technology at Massey University, Palmerston North, New Zealand." Massey University, 2008. http://hdl.handle.net/10179/946.
Повний текст джерелаXiao, Jiaxi. "Information theoretic approach in detection and security codes." Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/43620.
Повний текст джерелаPourghomi, Pardis. "Managing near field communication (NFC) payment applications through cloud computing." Thesis, Brunel University, 2014. http://bura.brunel.ac.uk/handle/2438/8538.
Повний текст джерелаBlommé, Johan. "Evaluation of biometric security systems against artificial fingers." Thesis, Linköping University, Department of Electrical Engineering, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1145.
Повний текст джерелаVerification of users’ identities are normally carried out via PIN-codes or ID- cards. Biometric identification, identification of unique body features, offers an alternative solution to these methods.
Fingerprint scanning is the most common biometric identification method used today. It uses a simple and quick method of identification and has therefore been favored instead of other biometric identification methods such as retina scan or signature verification.
In this report biometric security systems have been evaluated based on fingerprint scanners. The evaluation method focuses on copies of real fingers, artificial fingers, as intrusion method but it also mentions currently used algorithms for identification and strengths and weaknesses in hardware solutions used.
The artificial fingers used in the evaluation were made of gelatin, as it resembles the surface of human skin in ways of moisture, electric resistance and texture. Artificial fingers were based on ten subjects whose real fingers and artificial counterpart were tested on three different fingerprint scanners. All scanners tested accepted artificial fingers as substitutes for real fingers. Results varied between users and scanners but the artificial fingers were accepted between about one forth and half of the times.
Techniques used in image enhancement, minutiae analysis and pattern matching are analyzed. Normalization, binarization, quality markup and low pass filtering are described within image enhancement. In minutiae analysis connectivity numbers, point identification and skeletonization (thinning algorithms) are analyzed. Within pattern matching, direction field analysis and principal component analysis are described. Finally combinations of both minutiae analysis and pattern matching, hybrid models, are mentioned.
Based on experiments made and analysis of used techniques a recommendation for future use and development of fingerprint scanners is made.
Nordström, Daniel, and David Nyqvist. "Near Field Communication : En studie av säkerhetsaspekternas påverkan för mobila betalningar." Thesis, Uppsala universitet, Institutionen för informatik och media, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-179609.
Повний текст джерелаNear Field Communication (NFC) is a technology that enables the development of payments using the mobile phone. In Sweden, payments with NFC technology in mobile phones are still in the introductory phase. To ensure that the proposed technology can be utilized as a complement to existing payment options, one must consider the safety aspects of said construct. In this thesis we will review the technology with a focus on safety aspects. The purpose of this thesis is to review the security aspects of NFC technology for mobile payment and analyze these aspects in order to gain deeper knowledge of NFC technology opportunities. The knowledge has been obtained through a literature review, complemented by an interview to get a wide knowledge about the information. The results of the study show that NFC technology as a payment option can be affected by a number of safety issues. To ensure a viable market share, operators utilizing NFC technology must cooperate to standardize the implementation.
Швець, Валеріян Анатолійович, та Тетяна Вікторівна Мелешко. "Напрями забезпечення доступності і цілісності інформації глобальних навігаційних супутникових систем". Thesis, RS Global Sp. z O.O. Warsaw, Poland, 2020. http://er.nau.edu.ua/handle/NAU/41256.
Повний текст джерелаHassanzadeh, Reza. "A secure framework and related protocols for ubiquitous access to electronic health records using Java sim cards." Thesis, Queensland University of Technology, 2010. https://eprints.qut.edu.au/37589/1/Reza_Hassanzadeh_Thesis.pdf.
Повний текст джерелаКниги з теми "Information security fields"
1941-, Bruen Aiden A., Wehlau David L. 1960-, and Canadian Mathematical Society. Special Session on Error Control Codes, Information Theory, and Applied Cryptography, eds. Error-correcting codes, finite geometries, and cryptography: Conference on Error-control Codes, Information Theory, and Applied Cryptography, December 5-6, 2007, Fields Institute, Toronto, Ontario, Canada : Canadian Mathematical Society Special Session on Error Control Codes, Information Theory, and Applied Cryptography, Dec 8-10, 2007, CMS Winter Meeting, London, Ontario, Canada. Providence, R.I: American Mathematical Society, 2010.
Знайти повний текст джерелаRomanova, Yuliya, Pavel Muzychkin, Nataliya Zhenova, Lyudmila D'yakonova, Galina Eydlina, Konstantin Miloradov, Svetlana Vokina, and Al'bina Antonenkova. Modern information and communication technologies for successful business. ru: INFRA-M Academic Publishing LLC., 2021. http://dx.doi.org/10.12737/1073931.
Повний текст джерелаShitov, Viktor. Information content management. ru: INFRA-M Academic Publishing LLC., 2022. http://dx.doi.org/10.12737/1842520.
Повний текст джерелаRusskevich, Evgeniy. Criminally-legal counteraction to crimes committed through the use of modern information and communication technologies. ru: INFRA-M Academic Publishing LLC., 2017. http://dx.doi.org/10.12737/24712.
Повний текст джерелаHodakov, Viktor. Natural environment and human activity. ru: INFRA-M Academic Publishing LLC., 2021. http://dx.doi.org/10.12737/1194879.
Повний текст джерелаFedotova, Elena. Computer science. ru: INFRA-M Academic Publishing LLC., 2022. http://dx.doi.org/10.12737/1200564.
Повний текст джерелаRusskevich, Evgeniy. Criminal law and "digital crime": problems and solutions. ru: INFRA-M Academic Publishing LLC., 2021. http://dx.doi.org/10.12737/1840963.
Повний текст джерелаInformation sharing and national special security events: Preparing for the 2008 presidential conventions : field hearing before the Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, first session, August 10, 2007. Washington: U.S. G.P.O., 2009.
Знайти повний текст джерелаUnited, States Congress House Committee on Homeland Security Subcommittee on Intelligence Information Sharing and Terrorism Risk Assessment. Information sharing and national special security events: Preparing for the 2008 presidential conventions : field hearing before the Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, first session, August 10, 2007. Washington: U.S. G.P.O., 2009.
Знайти повний текст джерелаOffice, General Accounting. Social security: Issues relating to agency field offices : briefing report to the chairman, Subcommittee on Social Security, Committee on Ways and Means, House of Representatives. Washington, D.C: The Office, 1986.
Знайти повний текст джерелаЧастини книг з теми "Information security fields"
Seo, Hwajeong, Zhe Liu, Yasuyuki Nogami, Jongseok Choi, and Howon Kim. "Improved Modular Multiplication for Optimal Prime Fields." In Information Security Applications, 150–61. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-15087-1_12.
Повний текст джерелаYang, Bo-Yin, and Jiun-Ming Chen. "Theoretical Analysis of XL over Small Fields." In Information Security and Privacy, 277–88. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-27800-9_24.
Повний текст джерелаDoche, Christophe. "Redundant Trinomials for Finite Fields of Characteristic 2." In Information Security and Privacy, 122–33. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11506157_11.
Повний текст джерелаMiyamoto, Eito, Takeshi Sugawara, and Kazuo Sakiyama. "Efficient Software Implementation of Modular Multiplication in Prime Fields on TI’s DSP TMS320C6678." In Information Security Applications, 261–73. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-93563-8_22.
Повний текст джерелаAoki, Kazumaro, Fumitaka Hoshino, and Tetsutaro Kobayashi. "A Cyclic Window Algorithm for ECC Defined over Extension Fields." In Information and Communications Security, 62–73. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-45600-7_8.
Повний текст джерелаKwon, Soonhak. "Efficient Tate Pairing Computation for Elliptic Curves over Binary Fields." In Information Security and Privacy, 134–45. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11506157_12.
Повний текст джерелаFan, Xuejun, Song Tian, Bao Li, and Weixuan Li. "Constructing Hyperelliptic Covers for Elliptic Curves over Quadratic Extension Fields." In Information Security and Privacy, 630–38. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-21548-4_35.
Повний текст джерелаMeyer, Andreas, Stefan Neis, and Thomas Pfahler. "First Implementation of Cryptographic Protocols Based on Algebraic Number Fields." In Information Security and Privacy, 84–103. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-47719-5_9.
Повний текст джерелаGroßschädl, Johann, and Guy-Armand Kamendje. "Low-Power Design of a Functional Unit for Arithmetic in Finite Fields GF(p) and GF(2 m )." In Information Security Applications, 227–43. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24591-9_18.
Повний текст джерелаLenstra, Arjen K. "Using cyclotomic polynomials to construct efficient discrete logarithm cryptosystems over finite fields." In Information Security and Privacy, 126–38. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/bfb0027920.
Повний текст джерелаТези доповідей конференцій з теми "Information security fields"
Zhou, Shihai, and Xiangjiang Lu. "Fingerprint Identification and its Applications in Information Security Fields." In 2010 International Conference of Information Science and Management Engineering. ISME 2010. IEEE, 2010. http://dx.doi.org/10.1109/isme.2010.186.
Повний текст джерелаBioglio, V., T. Bianchi, and E. Magli. "Secure compressed sensing over finite fields." In 2014 IEEE International Workshop on Information Forensics and Security (WIFS). IEEE, 2014. http://dx.doi.org/10.1109/wifs.2014.7084326.
Повний текст джерелаZhe Li, Zhenfu Cao, and Xiaolei Dong. "Generalized Cipolla-Lehmer Root Computation in Finite Fields." In ICINS 2014 - 2014 International Conference on Information and Network Security. Institution of Engineering and Technology, 2014. http://dx.doi.org/10.1049/cp.2014.1281.
Повний текст джерелаVarna, Avinash L., and Min Wu. "Modeling content fingerprints using markov random fields." In 2009 First IEEE International Workshop on Information Forensics and Security (WIFS). IEEE, 2009. http://dx.doi.org/10.1109/wifs.2009.5386471.
Повний текст джерелаKhodaiemehr, Hassan, Daniel Panario, and Mohammad-Reza Sadeghi. "Modular Construction a Lattices from Cyclotomic Fields and their Applications in Information Security." In 2018 15th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC). IEEE, 2018. http://dx.doi.org/10.1109/iscisc.2018.8546855.
Повний текст джерелаVasseur, Marion, Xiuzhen Chen, Rida Khatoun, and Ahmed Serhrouchni. "Survey on packet marking fields and information for IP traceback." In 2015 International Conference on Cyber Security of Smart cities, Industrial Control System and Communications (SSIC). IEEE, 2015. http://dx.doi.org/10.1109/ssic.2015.7245326.
Повний текст джерелаSamardjiska, Simona, Yanling Chen, and Danilo Gligoroski. "Construction of Multivariate Quadratic Quasigroups (MQQs) in arbitrary Galois fields." In 2011 7th International Conference on Information Assurance and Security (IAS). IEEE, 2011. http://dx.doi.org/10.1109/isias.2011.6122839.
Повний текст джерелаLima, J. B., R. M. Campello de Souza, and D. Panario. "Security of public-key cryptosystems based on Chebyshev polynomials over prime finite fields." In 2008 IEEE International Symposium on Information Theory - ISIT. IEEE, 2008. http://dx.doi.org/10.1109/isit.2008.4595307.
Повний текст джерелаTeng, Jihong, Xiaoying Huang, and Weiming Zhang. "Some Results on the Degenerate Criterion of Cryptographic Functions over Finite Fields." In 2010 International Conference on Multimedia Information Networking and Security. IEEE, 2010. http://dx.doi.org/10.1109/mines.2010.186.
Повний текст джерелаQiang Bian, Min Zhang, Lihua Wang, and Fangjun Zhou. "Optimization of the compensatory anticathode in the electric fields protection of ship based on evolutionary programming." In 2010 IEEE International Conference on Information Theory and Information Security (ICITIS). IEEE, 2010. http://dx.doi.org/10.1109/icitis.2010.5689751.
Повний текст джерелаЗвіти організацій з теми "Information security fields"
Polyakova, Tatiyana An, Ignat S. Boychenko, and Nataliya An Troyan. Information and legal support of information security in the transport sector in the context of digital development. DOI CODE, 2021. http://dx.doi.org/10.18411/2021-0339-1001-46156.
Повний текст джерелаTemple, Dorota S., Jason S. Polly, Meghan Hegarty-Craver, James I. Rineer, Daniel Lapidus, Kemen Austin, Katherine P. Woodward, and Robert H. Beach III. The View From Above: Satellites Inform Decision-Making for Food Security. RTI Press, August 2019. http://dx.doi.org/10.3768/rtipress.2019.rb.0021.1908.
Повний текст джерелаMouha, Nicky. Review of the Advanced Encryption Standard. National Institute of Standards and Technology, July 2021. http://dx.doi.org/10.6028/nist.ir.8319.
Повний текст джерелаBeuermann, Diether, Nicolas L. Bottan, Bridget Hoffmann, Jeetendra Khadan, and Diego A. Vera-Cossio. Suriname COVID-19 Survey. Inter-American Development Bank, May 2021. http://dx.doi.org/10.18235/0003266.
Повний текст джерелаKramer, Robert. LED Street Lighting Implementation Research, Support, and Testing. Purdue University, 2020. http://dx.doi.org/10.5703/1288284317274.
Повний текст джерелаLers, Amnon, Majid R. Foolad, and Haya Friedman. genetic basis for postharvest chilling tolerance in tomato fruit. United States Department of Agriculture, January 2014. http://dx.doi.org/10.32747/2014.7600014.bard.
Повний текст джерелаPayment Systems Report - June of 2021. Banco de la República, February 2022. http://dx.doi.org/10.32468/rept-sist-pag.eng.2021.
Повний текст джерела