Academic literature on the topic 'Electronic security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Electronic security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Electronic security"

1

Cullinane, David. "Electronic Commerce Security." Information Systems Security 7, no. 3 (1998): 54–65. http://dx.doi.org/10.1201/1086/43300.7.3.19980901/31009.10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gifford, E. A. "Electronic information security." IEEE Potentials 7, no. 4 (1988): 26–30. http://dx.doi.org/10.1109/45.31568.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kumar, Dr D. R. V. A. Sharath, N. Soumya, Bhukya Ramesh, and Thatikayala Sandeep. "Three Tire Security System for Electronic Voting Machine." International Journal of Psychosocial Rehabilitation 23, no. 1 (2019): 449–54. http://dx.doi.org/10.37200/ijpr/v23i1/pr190257.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ai, Jing Feng. "Study and Design on Electronic Cash System Security Architecture." Advanced Materials Research 816-817 (September 2013): 962–66. http://dx.doi.org/10.4028/www.scientific.net/amr.816-817.962.

Full text
Abstract:
The rapid development of electronic financial services, attendant come an increasingly serious network security problem, especially electronic cash exchange network security issues facing the urgent need to resolve. In this paper, electronic cash scheme detailed research and analysis, and then design a secure electronic cash system based on an improved theory of electronic cash scheme, it includes detailed electronic payment requirements analysis, system design, e-commerce payment system design, server design and client design. Finance and electronics industry combining electronic financial system, if they can effectively solve the security issues, I believe it can be quickly developed.
APA, Harvard, Vancouver, ISO, and other styles
5

Bessler, Sandford. "Electronic Security und Privacy." e & i Elektrotechnik und Informationstechnik 127, no. 5 (2010): 115. http://dx.doi.org/10.1007/s00502-010-0729-y.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

King, Christopher M. "Internet Electronic Mail Security." Information Systems Security 7, no. 2 (1998): 1–7. http://dx.doi.org/10.1201/1086/43303.7.2.19980601/31043.9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Amoroso, Edward, and Matthew Bishop. "Security enables electronic commerce." Journal of Network and Systems Management 4, no. 3 (1996): 247–49. http://dx.doi.org/10.1007/bf02139145.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ekerbrink, Ivan. "Security of electronic transactions." Computers & Security 5, no. 2 (1986): 168. http://dx.doi.org/10.1016/0167-4048(86)90148-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Price, Wyn L. "Security in electronic mail." Computer Communications 9, no. 2 (1986): 96–99. http://dx.doi.org/10.1016/0140-3664(86)90009-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Radl, Alison, and Yu-Che Chen. "Computer Security in Electronic Government." International Journal of Electronic Government Research 1, no. 1 (2005): 79–99. http://dx.doi.org/10.4018/jegr.2005010105.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Electronic security"

1

Pao, Hua-Fu. "Security management of electronic data interchange." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1993. http://handle.dtic.mil/100.2/ADA272962.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zhao, Weiliang, University of Western Sydney, of Science Technology and Environment College, and School of Computing and Information Technology. "Security techniques for electronic commerce applications." THESIS_CSTE_CIT_Zhao_W.xml, 2003. http://handle.uws.edu.au:8081/1959.7/127.

Full text
Abstract:
Electronic commerce and the internet provide greater opportunities for companies and individual person to be involved in commercial activities; the involved parties may not know or trust each other or may even be mutually suspicious of each other. The issue of fairness becomes more critical and must be well addressed. The aim of this thesis is to investigate security solutions with fairness for on-line transactions. A fair trading protocol with credit payment is proposed. The proof of equivalence of discrete logarithm to discrete loglogarithm is employed as the main tool to construct the protocol. The scheme provides a unique link between payment and gambling outcome so that the winner can be ensured to get the payment. Since an optimal fair exchange method is used in gambling message exchange, the proposed system guarantees that no one can successfully cheat during a gambling process. Our system requires an off-line Trusted Third Party (TTP). If cheating occurs, the TTP can resolve the problem and make the gambling process fair. An efficient and secure poker scheme is proposed. It is based on multiple encryption and decryption of individual cards. The protocol satisfies all major security requirements of a real mental poker. It gets rid of the Card Salesman and guarantees minimal effect due to collusion. The protocol is secure and more efficient compared with other known protocols. The strategies of players can be kept confidential with the introduction of a Dealer. The protocol is suitable to be implemented in an on-line gambling card game. The implementation of the fair on-line gambling protocol has been demonstrated and all utility classes for the implementation have been defined.<br>Master of Science (Hons)
APA, Harvard, Vancouver, ISO, and other styles
3

Zhao, Weiliang. "Security techniques for electronic commerce applications /." View thesis View thesis, 2003. http://library.uws.edu.au/adt-NUWS/public/adt-NUWS20030505.155156/index.html.

Full text
Abstract:
Thesis (M.Sc. (Hons.)) -- University of Western Sydney, 2003.<br>"A thesis submitted for the degree of Master of Science (Honours) - Computing and Information Technology at University of Western Sydney" Bibliography : leaves 109-114.
APA, Harvard, Vancouver, ISO, and other styles
4

González, Calabuig Andreu. "Electronic Tongues for food and security applications." Doctoral thesis, Universitat Autònoma de Barcelona, 2018. http://hdl.handle.net/10803/643301.

Full text
Abstract:
En la present tesi doctoral s’aprofundeix en l’estudi de les llengües electròniques i el seu desenvolupament com a línia d’investigació del grup de Sensors i Biosensors de la Universitat Autònoma de Barcelona. Aquesta línea d’investigació posa el focus en l’aplicació dels coneixements del grup d’investigació en desenvolupament de sensors electroquímics per a desenvolupar matrius de sensors per al seu ús en aplicacions del tipus Llengua Electrònica en diferents camps. La llengua electrònica es considera un nou paradigma en el món dels sensors ja que millora el resultats analítics mitjançant el tractament amb eines quimio mètriques. Les dades electroquímiques van ser obtingudes mitjançant la tècnica de voltamperometria en les diferents variants: cíclica i diferencial de polsos. El tractament estadístic es va utilitzar per a extreure i seleccionar la informació química rellevant de les dades originals; els mètodes utilitzats van ser l’Anàlisi de Components Principals i l’Anàlisi Discriminant Lineal per estudis qualitatius i la Regressió de Mínims Quadrats Parcials i les Xarxes Neuronals Artificials per estudis quantitatius. Les aplicacions descrites en el present manuscrit estan classificades en tres camps diferenciats: seguretat, seguiment mediambiental i sector del vi. En el primer camp, la seguretat, les Llengües Electròniques conjuntament amb les eines quimio mètriques s’han utilitzat per a la quantificació de components com: TNT, Tetryl, HMX, RDX, PETN i TATP. A l’apartat quantitatiu es determinaren mescles ternàries de TNT, Tetryl y TATP. Les Llengües Electròniques desenvolupades en el camp mediambiental es divideixen en dos camps. La primera va ser desenvolupada per a la detecció de metalls pesants en aigua on es van desenvolupar dues aplicacions per detectar simultàniament cadmi, plom i coure o cadmi, plom i mercuri. La segona aplicació és la quantificació de mescles ternàries de contaminants persistents tals com: cresol, m-cresol i guaiacol en mostres d’aigua residual. En el camp alimentari es presenten dos treballs: la detecció de defectes tipus Brett en vi, causats per la presència de fenols volàtils i la classificació i predicció de la denominació d’origen i la nota de tast de vins negres i blancs de Catalunya.<br>This thesis memory is focused on the continuation of the electronic tongue line of investigation in the Sensors and Biosensors Group in the Department of Chemistry of Universistat Autònoma de Barcelona. This line has been heavily focused on the application of the group know-how in electrochemical sensor development to design several sensors arrays to be applied following electronic tongue principles in different analytical scenarios. The electronic tongue principles are the new paradigm in the sensor field, where a large number of sensors with low selectivity are used in conjunction with chemometric data processing tools. The electrochemical data was acquired using voltammetry in its different variants: cyclic voltammetry and differential pulse voltammetry. Statistical treatment was performed to extract and select the relevant chemical information from the data samples; the main methods employed were Principal Component analysis and Lineal Determinant Analysis for qualitative studies and Partial Least Squares and Artificial Neural Networks for quantitative studies. The applications described in this thesis memory are comprised in 3 different fields: homeland security, environmental monitoring and beverage field. In the field of homeland security an Electronic Tongue system coupled with chemometric tools was used to identify and quantify the explosive compounds such as: TNT, Tetryl, HMX, RDX, PETN and TATP. Also a quantification study with ternary mixtures of TNT, Tetryl and TATP was performed. The Electronic Tongues developed in the field of environmental monitoring have 2 disctinct branches. The first one is the detection of heavy metals in water, in this case two applications where developed to simultaneously detect cadmium, lead and copper or cadmium, lead and mercury. The second application is the quantification of ternary mixtures of persistent phenolic pollutants such as: cresol, m-cresol and guaiacol in wastewaters In the beverage field the works presented focus in the detection of the Brett defect in wines, caused by the presence of certain volatile phenols, and the classification and prediction of designation of origin and sensory panel scores in red and white wines.
APA, Harvard, Vancouver, ISO, and other styles
5

Marais, Terrence K. "Electronic payment and security on the Internet." Thesis, Stellenbosch : Stellenbosch University, 2002. http://hdl.handle.net/10019.1/52819.

Full text
Abstract:
Thesis (MBA)--Stellenbosch University, 2002.<br>ENGLISH ABSTRACT: The greatest potential worry that an on-line shopper has is what happens to his/her credit card details from the moment "submit" is pressed on the computer. Is it possible for someone on the Internet to intercept the message and use credit card details maliciously? Also, there is a lot of talk about personal details being encrypted, but how sure is one that this was indeed the case once "submit" has been pressed? Is there a way in which one can be sure that a transaction will occur only once? Many of the security issues are new and many experts are only learning how to deal with these now. This thesis offers suggestions and strategies a user can follow to minimize misuse and abuse of payment details. Electronic payment is the backbone of e-commerce, and the biggest threat towards widespread acceptance and usage of e-commerce is security. Many innovative solutions have been developed by vendors to address security issues. For example, the Secure Electronic Transfer (SET) protocol was developed to ensure that credit card transactions could be conducted safely and securely on the Internet. Secure Socket Layer (SSL) ensures that all communications and transactions are conducted in a tightly secure environment. This is critical for online or mobile banking and other financial activities. Others developments include payment systems that ensure that credit card details are never exposed to a merchant (e.g. SET), while some ensure that credit card numbers never enter the Internet. The five corner stones of security are confidentiality, privacy, authentication, integrity and non-repudiation. Authentication, non-repudiation and integrity can be resolved with digital certificates, digital timestamps and digital signatures. Message confidentiality, on the other hand, is ensured through the use of strong encryption. Encryption systems mutilate data or a message to such an extent that it is totally useless to someone who does not have the appropriate algorithm and key to decode it. The most widely used encryption schemes are the secret key and public key encryption systems. The public key cryptosystem generates two keys, called a public and private key. The public key can be made generally known, but the private key must be kept secret. A unique property of the scheme is that once data is encrypted with one key, only the corresponding other key of the pair can decrypt it. This makes it possible to address issues of authentication, integrity and non-repudiation. Traditional payment instruments such as cash, cheques, debit and credit card transactions are being replaced by their electronic equivalents. The driving forces behind these are transactional security, efficiency and speed. Novel payment solutions and strategies have been devised to meet the challenges of this new economy. For example, smart cards can act as an electronic purse that can hold electronic money. Other information, such as personal details, medical records, driver's licence, etc. can also be stored on the card. Whilst many security experts are in agreement that security is not a barrier anymore for wider usage of the Internet for financial transactions, many consumers are still apprehensive about how secure and safe it really is. This work aims to diminish those fears and show that the Internet is safe for business.<br>AFRIKAANSE OPSOMMING: Een van die grootste bekommernisse wat 'n kliënt met aankope op die Internet kan ondervind, is die onsekerheid wat presies gebeur nadat betalings aangegaan is en "Submit" is gedruk. Is dit moontlik dat iemand die boodskap kan onderskep en betaling besonderhede vir eie gebruik kan herwin? Daar is ook baie publisiteit oor kodifisering, maar hoe kan die klient verseker wees dat betalings besonderhede wel gekodifiseer is wanneer "Submit" gedruk was? Is daar 'n manier waarmee 'n mens verseker kan wees dat betaling slegs eenkeer gaan geskied? Baie van die sekuriteits lokvalle is nuut en sekuritiets kenners is tans besig om te leer hoe om die probleme te hanteer. Die werkstuk offer wenke en strategieë vir die verbruiker om die misbruik van betaling besondehede op die Internet te minimiseer. Elektronies betalings meganisme is die ruggraat van elektroniese besigheid, en die grootste struikelblok tot die grootskaalse gebruik daarvan is sekuriteit. Daar is baie innoverende oplossings om die probleme hok te slaan. By voorbeeld, die Secure Electronic Transfer (SET) protokol was ontwikkel om te verseker dat betalings met kredietkaart met hoë sekuriteit en veiligheid aangegaan kan word. Secure Socket Layers (SSL), verseker dat alle kommunikasies en transaksies in 'n sekuur en veilige omgewing plaasvind. Dit is veral krities wanneer die verbruiker gebruik maak van die Internet of vanaf selfone om transaksies aan te gaan met 'n bank. Ander ontwikkelinge sluit in betalings metodes wat verseker dat die handelaar nooit die kredietkaart besonderhede sien nie (bv. SET). Ander verseker weer dat die betalings besonderhede nooit oor die Internet hoef gestuur te word nie. Die vyf hoekstene van sekuriteit is konfidensialiteit, privaatheid, outentisiteit, integriteit en non-repudiasie. Outentisiteit, integriteit en non-repudiasie word opgelos deur die gebruik maak van digitale sertifikate, digitale tydstempels en digitale handtekeninge. Konfidensialiteit kan verseker word deur die boodskap te kodifiseer. Kodifikasie behels die verandering van data of boodskappe op so 'n wyse dat dit van geen betekenis is vir 'n persoon wat nie die korrekte algoritme en sleutel het om dit te dekodifiseer nie. Die geheime en publieke kodifiserings stelsels word die meeste gebruik om data te kodifiseer. Die publieke kodifiserings stelsel genereer twee sleutels, naamlik 'n privaat en publieke sleutel. Die publieke sleutel kan alom bekend gemaak word, maar die private sleutel moet slegs bekend wees aan sy gebruiker. 'n Unieke eienskap van die stelsel is dat indien 'n boodskap gekodifiseer is met een sleutel, slegs die ander sleutel van die paar dit sal kan dekodifiseer. Dit maak dit moontlik om outentisiteit, integriteit en non-repudiasie toe te pas. Die tradisionele metodes van betaling soos kontant, tjek en debiet of kredietkaart, gaan mettertyd vervang word deur hul elektroniese eweknie. Die dryfkrag agter die verskynsel is die hoë sekuriteit, doeltreffendheid en spoed waarmee transaksies op die manier gehanteer kan word. Vindingryke betaling metodes is ontdek om die besondere uitdagings van die nuwe ekonomie aan te speek. Byvoorbeeld, knap kaarte kan gebruik word as 'n elektroniese beursie wat elektroniese geld bêre. Ander persoonlike inligting, mediese records, bestuurlisensies, ens. kan ook op die kaart geberg word. Terwyl baie sekuriteits kenners glo dat sekuriteit nie meer 'n stuikelblok is om die Internet vir besigheids transaksies te gebruik nie, bly baie van die verbruikers skepties. Die werkstuk se doel is om daardie onsekerhede uit die weg te ruim, deur te verduidelik hoe sekuriteit toe gepas word, en om te bewys dat die Internet interdaad veilig is as a medium vir besigheids transaksies.
APA, Harvard, Vancouver, ISO, and other styles
6

Khu-Smith, Vorpranee. "Enhancing the security of electronic commerce transactions." Thesis, Royal Holloway, University of London, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.406487.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

DeWitt, Alexander John Anthony George. "Usability issues with security of electronic mail." Thesis, Brunel University, 2007. http://bura.brunel.ac.uk/handle/2438/1059.

Full text
Abstract:
This thesis shows that human factors can have a large and direct impact on security, not only on the user’s satisfaction, but also on the level of security achieved in practice. The usability issues identified are also extended to include mental models and perceptions as well as traditional user interface issues. These findings were accomplished through three studies using various methodologies to best suit their aims. The research community have issued principles to better align security and usability, so it was first necessary to evaluate their effectiveness. The chosen method for achieving this was through a usability study of the most recent software specifically to use these principles. It was found that the goal of being simultaneously usable and secure was not entirely met, partially through problems identified with the software interface, but largely due to the user’s perceptions and actions whilst using the software. This makes it particularly difficult to design usable and secure software without detailed knowledge of the users attitudes and perceptions, especially if we are not to blame the user for security errors as has occurred in the past. Particular focus was given to e-mail security because it is an area in which there is a massive number of vectors for security threats, and in which it is technologically possible to negate most of these threats, yet this is not occurring. Interviews were used to gain in depth information from the user’s point of view. Data was collected from individual e-mail users from the general public, and organisations. It was found that although the literature had identified various problems with the software and process of e-mail encryption, the majority of problems identified in the interviews stemmed once again from user’s perceptions and attitudes. Use of encryption was virtually nil, although the desire to use encryption to protect privacy was strong. Remembering secure passwords was recurrently found to be problematic, so in an effort to propose a specific method of increasing their usability an empirical experiment was used to examine the memorability of passwords. Specially constructed passwords were tested for their ability to improve memorability, and therefore usability. No statistical significance in the construction patterns was found, but a memory phenomenon whereby users tend to forget their password after a specific period of non-use was discovered. The findings are discussed with reference to the fact that they all draw on a theme of responsibility to maintain good security, both from the perspective of the software developer and the end user. The term Personal Liability and General Use Evaluation (PLaGUE) is introduced to highlight the importance of considering these responsibilities and their effect on the use of security.
APA, Harvard, Vancouver, ISO, and other styles
8

Cheang, Sek Lam. "Electronic commerce and security : risk identification and management." Thesis, University of Macau, 2001. http://umaclib3.umac.mo/record=b1636215.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Eriksson, Oskar, Kristian Maric, and Hans Olsberg. "Electronic Identification : Focus on bank services and security." Thesis, Jönköping University, Jönköping International Business School, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-62.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Rodrigues, Aniket. "SCADA security device: design and implementation." Thesis, Wichita State University, 2011. http://hdl.handle.net/10057/5195.

Full text
Abstract:
Securing SCADA systems is a critical aspect of Smart grid security. As sophisticated attacks continue to target industrial systems, the focus should be on planning and developing new security techniques that will adapt to the SCADA environment and protocols. Traditional SCADA protocols such as DNP3, Modbus and ICCP do not support encryption, authentication and data integrity in their native form. Although they can be secured with VPN tunnels, IPSEC adds significant network overhead and complexity to the end hosts. SCADA devices may lack the computing resources to implement this kind of technique. In this thesis, a security design is proposed that can help make communications between the master stations and slave devices in a SCADA network secure without putting additional overhead on the remote devices. This research designs a SCADA Security Device (SSD), which can work in conjunction with other network elements to implement a secure architecture for SCADA protocols. Several components of the SSD were implemented and tested during this research to evaluate the security features in a SCADA network.<br>Thesis (M.S.)--Wichita State University, College of Engineering, Dept. of Electrical Engineering and Computer Science.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Electronic security"

1

MSI. Electronic security systems. Marketing Research for Industry, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Damasiotis, Vyron. Electronic mail and security. Oxford Brookes University, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Shoniregun, Charles A. Electronic Healthcare Information Security. Springer Science+Business Media, LLC, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bailin, Paul, and Diana E. Kole. Electronic security: Products & system. Freedonia Group, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Shoniregun, Charles A., Kudakwashe Dube, and Fredrick Mtenzi. Electronic Healthcare Information Security. Springer US, 2010. http://dx.doi.org/10.1007/978-0-387-84919-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

J, Carr Joseph, ed. Understanding security electronics. H.W. Sams, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Electronic protection and security systems. 2nd ed. Newnes, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Martin, Vaughn. Electronic & microprocessor controlled security projects. Tab Books, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Electronic protection and security systems. Newnes, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Gaffigan, Robert. Home security projects. Prompt Publications, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Electronic security"

1

Paul, Aidan. "Electronic Security." In Flemings. Macmillan Education UK, 1989. http://dx.doi.org/10.1007/978-1-349-10985-2_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Weik, Martin H. "electronic security." In Computer Science and Communications Dictionary. Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_5999.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Fischer, Stephan, Achim Steinacker, Reinhard Bertram, and Ralf Steinmetz. "Electronic Commerce." In Open Security. Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/978-3-642-47643-3_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Weik, Martin H. "electronic emission security." In Computer Science and Communications Dictionary. Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_5973.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

De Soete, Marijke. "Electronic Cheque." In Encyclopedia of Cryptography and Security. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_285.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bleumer, Gerrit. "Electronic Cash." In Encyclopedia of Cryptography and Security. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_197.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bleumer, Gerrit. "Electronic Payment." In Encyclopedia of Cryptography and Security. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_198.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bleumer, Gerrit. "Electronic Postage." In Encyclopedia of Cryptography and Security. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_199.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Bleumer, Gerrit. "Electronic Wallet." In Encyclopedia of Cryptography and Security. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_200.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Wirtz, Brigitte. "Biometric System Security." In Securing Electronic Business Processes. Vieweg+Teubner Verlag, 2004. http://dx.doi.org/10.1007/978-3-322-84982-3_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Electronic security"

1

Luxiong Xu, Na Wang, and Chenglian Liu. "Security of electronic ticketing." In 2010 International Conference On Computer and Communication Technologies in Agriculture Engineering (CCTAE). IEEE, 2010. http://dx.doi.org/10.1109/cctae.2010.5543314.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Manke, Gerald C. "Lasers in Electronic Warfare." In SPIE Security + Defence, edited by David H. Titterton, Mark A. Richardson, Robert J. Grasso, Willy L. Bohn, and Harro Ackermann. SPIE, 2014. http://dx.doi.org/10.1117/12.2073748.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ross, L. F. "Electronic Instrumentation and Security System." In 39th Annual Earthmoving Industry Conference. SAE International, 1988. http://dx.doi.org/10.4271/880797.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Xenakis, A., and A. Macintosh. "Procedural security in electronic voting." In 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the. IEEE, 2004. http://dx.doi.org/10.1109/hicss.2004.1265299.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Giustolisi, Rosario, Gabriele Lenzini, and Giampaolo Bella. "What security for electronic exams?" In 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS). IEEE, 2013. http://dx.doi.org/10.1109/crisis.2013.6766348.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Szapiel, Stan, Catherine Greenhalgh, Kevin Wagner, and Ryan Nobes. "Electronic eyebox for weapon sights." In SPIE Defense + Security, edited by Jay N. Vizgaitis, Bjørn F. Andresen, Peter L. Marasco, Jasbinder S. Sanghera, and Miguel P. Snyder. SPIE, 2016. http://dx.doi.org/10.1117/12.2228782.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Trujillo, Eddie J., and Steven D. Ellersick. "Boeing electronic flight bag." In Defense and Security Symposium, edited by James C. Byrd, Daniel D. Desjardins, Eric W. Forsythe, and Henry J. Girolamo. SPIE, 2006. http://dx.doi.org/10.1117/12.668391.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

O'Regan, Terrance, and Philip Perconti. "2D electronic materials for army applications." In SPIE Defense + Security, edited by Thomas George, Achyut K. Dutta, and M. Saif Islam. SPIE, 2015. http://dx.doi.org/10.1117/12.2178401.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Perju, Veacheslav L., David P. Casasent, Valeriy S. Feshchenko, and Lubov V. Feshchenko. "Optical-electronic technologies in materials analysis." In Defense and Security, edited by David P. Casasent and Tien-Hsin Chao. SPIE, 2005. http://dx.doi.org/10.1117/12.604321.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Smith, Carl R., Robert Grasso, Jack Pledger, and Naveen Murarka. "Trends in electro-optical electronic warfare." In SPIE Security + Defence, edited by David H. Titterton and Mark A. Richardson. SPIE, 2012. http://dx.doi.org/10.1117/12.978652.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Electronic security"

1

Tracy, M. C., W. Jansen, and S. Bisker. Guidelines on electronic mail security. National Institute of Standards and Technology, 2002. http://dx.doi.org/10.6028/nist.sp.800-45.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Tracy, M. C., W. Jansen, K. A. Scarfone, and J. Butterfield. Guidelines on electronic mail security. National Institute of Standards and Technology, 2007. http://dx.doi.org/10.6028/nist.sp.800-45ver2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Saltman, Roy G. Good security practices for electronic commerce, including electronic data interchange. National Institute of Standards and Technology, 1993. http://dx.doi.org/10.6028/nist.sp.800-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Smith, S. W., and P. S. Pedersen. Organizing electronic services into security taxonomies - revised. Office of Scientific and Technical Information (OSTI), 1997. http://dx.doi.org/10.2172/420392.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hastings, Nelson, Rene Peralta, Stefan Popoveniuc, and Andrew Regenscheid. Security considerations for remote electronic UOCAVA voting. National Institute of Standards and Technology, 2011. http://dx.doi.org/10.6028/nist.ir.7770.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Rose, Scott, William Barker, Santos Jha, Chinedum Irrechukwu, and Karen Waltermire. Domain name system-based electronic mail security. National Institute of Standards and Technology, 2017. http://dx.doi.org/10.6028/nist.sp.1800-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Regenscheid, Andrew, and Geoff Beier. Security best practices for the electronic transmission of election materials for UOCAVA voters. National Institute of Standards and Technology, 2011. http://dx.doi.org/10.6028/nist.ir.7711.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

NATIONAL COMMUNICATIONS SYSTEM WASHINGTON DC. The Electronic Intrusion Threat to National Security and Emergency Preparedness Telecommunications. An Awareness Document. Defense Technical Information Center, 1994. http://dx.doi.org/10.21236/ada301642.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

WASHINGTON UNIV ST LOUIS MO. The Electronic Intrusion Threat to National Security and Emergency Preparedness (NS/EP) Telecommunications. An Awareness Document. Defense Technical Information Center, 1999. http://dx.doi.org/10.21236/ada385372.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Polyakova, Tatiyana An, Ignat S. Boychenko, and Nataliya An Troyan. Information and legal support of information security in the transport sector in the context of digital development. DOI CODE, 2021. http://dx.doi.org/10.18411/2021-0339-1001-46156.

Full text
Abstract:
The current paper deals with the information and legal support of information security in the transport sector in the context of digital development. Thus, the development of information and telecommunication technologies and the digitalization of public relations have also affected the field of transport and transport services. There have appeared not only new Транспортное право и безопасность. 2021. № 3(39) 148 transportation means, such as unmanned aircraft, but there are also being introduced information systems related to the identification of passengers in transport. The development of electronic interaction between various subjects of information exchange in transport is a consequence of the global digitalization of public relations, which creates certain risks of enforcing information security, a threat to the information transport infrastructure.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography