Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Sécurité information")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 42

  • Page / 2
Export

Selection :

  • and

Secret-hardware public-key cryptographyKAK, S. C.IEE proceedings. Part E. Computers and digital techniques. 1986, Vol 133, Num 2, pp 94-96, issn 0143-7062Article

The job market for the information security professionalOTT, Jeffrey L.Information systems security. 2001, Vol 10, Num 5, pp 2-4, issn 1065-898XArticle

The effects of outsourcing on information securityALNER, Marie.Information systems security. 2001, Vol 10, Num 2, pp 35-43, issn 1065-898XArticle

Learning the computer forensic wayKUCHTA, Kelly J. K. J.Information systems security. 2001, Vol 10, Num 5, issn 1065-898X, 1, 29-35 [8 p.]Article

A user authentication system using back-propagation networkLIN, Iuon-Chang; OU, Hsia-Hung; HWANG, Min-Shiang et al.Neural computing & applications (Print). 2005, Vol 14, Num 3, pp 243-249, issn 0941-0643, 7 p.Article

Detection of information leak by data flow analysis: Preliminary reportDOH, Ktung-Goo; SHIN, Seung Cheol.ACM SIGPLAN notices. 2002, Vol 37, Num 8, pp 66-71, issn 1523-2867Article

Wireless Internet securityLEE, Dennis Seymour.Information systems security. 2002, Vol 11, Num 3, pp 34-50, issn 1065-898XArticle

Information security (Sao Paulo, 30 September - 2 October 2002)Chan, Agnes Hui; Gligor, Virgil.Lecture notes in computer science. 2002, issn 0302-9743, isbn 3-540-44270-7, XII, 502 p, isbn 3-540-44270-7Conference Proceedings

Statistical confidentiality tests for a quantum transmission using continuous variablesNAVEZ, P.The European physical journal. D, Atomic, molecular and optical physics (Print). 2002, Vol 18, Num 2, pp 219-228, issn 1434-6060Conference Paper

A new optical random coding technique for security systemsZALEVSKY, Z; MENDLOVIC, D; LEVY, U et al.Optics communications. 2000, Vol 180, Num 1-3, pp 15-20, issn 0030-4018Article

Strongly secure ramp secret sharing schemes for general access structuresIWAMOTO, Mitsugu; YAMAMOTO, Hirosuke.Information processing letters. 2006, Vol 97, Num 2, pp 52-57, issn 0020-0190, 6 p.Article

Several security schemes constructed using ECC-based self-certified public key cryptosystemsTSAUR, Woei-Jiunn.Applied mathematics and computation. 2005, Vol 168, Num 1, pp 447-464, issn 0096-3003, 18 p.Article

An agent based privacy preserving mining for distributed databasesSUNG WOOK BAIK; BALA, Jerzy; DAEWOONG RHEE et al.Lecture notes in computer science. 2004, pp 910-915, issn 0302-9743, isbn 3-540-24127-2, 6 p.Conference Paper

Criminalizing tool buildingPOORE, Ralph Spencer.Information systems security. 2001, Vol 10, Num 5, pp 5-9, issn 1065-898XArticle

Information security management and assurance a call to action for corporate governanceHOLZINGER, Al.Information systems security. 2000, Vol 9, Num 2, pp 32-39, issn 1065-898XArticle

Information security - protecting your assetsVINCE, J.Aslib proceedings. 1996, Vol 48, Num 4, pp 109-115, issn 0001-253XArticle

Securing display of grayscale and multicolored images by use of visual cryptographyYAMAMOTO, Hirotsugu; HAYASAKI, Yoshio; NISHIDA, Nobuo et al.SPIE proceedings series. 2004, pp 716-724, isbn 0-8194-5209-2, 9 p.Conference Paper

The effect of multi-pair signal states in quantum cryptography with entangled photonsDUSEK, Miloslav; BRADLER, Kamil.Journal of optics. B, Quantum and semiclassical optics (Print). 2002, Vol 4, Num 2, pp 109-113, issn 1464-4266Article

La cryptographie quantique : L'incertitude quantique au service de la confidentialité = Quantum cryptography : quantum uncertainty in the service of confidentialityGROSSHANS, Frédéric.Photoniques (Orsay). 2002, Num 8, pp 28-32, issn 1629-4475, 5 p.Article

Optimal unconditional information diffusionMALKHI, Dahlia; PAVLOV, Elan; SELLA, Yaron et al.Lecture notes in computer science. 2001, pp 63-77, issn 0302-9743, isbn 3-540-42605-1Conference Paper

Security concerns of system users : a study of perceptions of the adequacy of securityGOODHUE, D. L; STRAUB, D. W.Information & management. 1991, Vol 20, Num 1, pp 13-27, issn 0378-7206Article

Comment on traceability on RSA-based partially signature with low computationWU, Lin-Chuan; YEH, Yi-Shiung.Applied mathematics and computation. 2005, Vol 170, Num 2, pp 1344-1348, issn 0096-3003, 5 p.Article

Cryptanalysis of the improved authenticated key agreement protocolCHANG, Ting-Yi; YANG, Chou-Chan; YANG, Ya-Wen et al.Applied mathematics and computation. 2005, Vol 171, Num 2, pp 771-774, issn 0096-3003, 4 p.Article

Multidimensional data encryption with digital holographyLINGFENG YU; LILONG CAI.Optics communications. 2003, Vol 215, Num 4-6, pp 271-284, issn 0030-4018, 14 p.Article

HIT: A new approach for Hiding multimedia information in TextEL-KWAE, Essam A; LI CHENG.SPIE proceedings series. 2002, pp 132-140, isbn 0-8194-4415-4Conference Paper

  • Page / 2