-
61
Cryptographically Secure Shield for Security IPs Protection
Published 2017Subjects: “…Cryptographically secure shield…”
Get full text
Get full text
Journal Article -
62
-
63
-
64
-
65
-
66
-
67
Climate Change, Threat Multiplier Effect, and Security: From Climate Security to International Security
Published 2023-12-01Subjects: Get full text
Article -
68
Secure System? Challenge Accepted: Finding and Resolving Security Failures Using Security Premortems
Published 2012Conference item -
69
Secure User Authentication With Information Theoretic Security Using Secret Sharing-Based Secure Computation
Published 2025-01-01Subjects: Get full text
Article -
70
From securing whiteness to securing publics ? Marginalized communities and differential stakeholdership in domestic security in the UK
Published 2023-04-01“…This article develops some conceptual questions about publics and stakeholdership in security which were originally raised in a previous article published by this author. …”
Get full text
Article -
71
In depth analysis on secure socket layer-transport layer security (SSL-TLS) security flaws
Published 2024“…In this paper, we explore the fundamental of Secure Socket Layer-Transport Layer Security (SSL-TLS) as well as looking through the past security flaws of SSL-TLS with examples of how various attacks manage to bypass SSL-TLS. …”
Get full text
Final Year Project (FYP) -
72
Maritime security : container security shipping and trade current issues (container port security - Singapore)
Published 2019“…The ratings were attained through conducting surveys with relevant port industry players and maritime security personnel. The results revealed the ranking according to the risk value of the security threats, where a cybersecurity threat emerged as top. …”
Get full text
Final Year Project (FYP) -
73
To boldly go where invention isn't secure: applying Security Entrepreneurship to secure systems design
Published 2010Conference item -
74
-
75
-
76
Security software development : assessing and managing security risks /
Published 2009Subjects: “…Computer security…”
-
77
-
78
Study of secure firewall filtering mechanism for network security /
Published 2009Subjects: “…Firewalls (Computer security)…”
-
79
-
80
Information security architecture : an integrated approach to security in the organization /
Published 2000Subjects: “…Computer security…”