Academic literature on the topic 'Electronic security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Electronic security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Electronic security"
Cullinane, David. "Electronic Commerce Security." Information Systems Security 7, no. 3 (1998): 54–65. http://dx.doi.org/10.1201/1086/43300.7.3.19980901/31009.10.
Full textGifford, E. A. "Electronic information security." IEEE Potentials 7, no. 4 (1988): 26–30. http://dx.doi.org/10.1109/45.31568.
Full textKumar, Dr D. R. V. A. Sharath, N. Soumya, Bhukya Ramesh, and Thatikayala Sandeep. "Three Tire Security System for Electronic Voting Machine." International Journal of Psychosocial Rehabilitation 23, no. 1 (2019): 449–54. http://dx.doi.org/10.37200/ijpr/v23i1/pr190257.
Full textAi, Jing Feng. "Study and Design on Electronic Cash System Security Architecture." Advanced Materials Research 816-817 (September 2013): 962–66. http://dx.doi.org/10.4028/www.scientific.net/amr.816-817.962.
Full textBessler, Sandford. "Electronic Security und Privacy." e & i Elektrotechnik und Informationstechnik 127, no. 5 (2010): 115. http://dx.doi.org/10.1007/s00502-010-0729-y.
Full textKing, Christopher M. "Internet Electronic Mail Security." Information Systems Security 7, no. 2 (1998): 1–7. http://dx.doi.org/10.1201/1086/43303.7.2.19980601/31043.9.
Full textAmoroso, Edward, and Matthew Bishop. "Security enables electronic commerce." Journal of Network and Systems Management 4, no. 3 (1996): 247–49. http://dx.doi.org/10.1007/bf02139145.
Full textEkerbrink, Ivan. "Security of electronic transactions." Computers & Security 5, no. 2 (1986): 168. http://dx.doi.org/10.1016/0167-4048(86)90148-3.
Full textPrice, Wyn L. "Security in electronic mail." Computer Communications 9, no. 2 (1986): 96–99. http://dx.doi.org/10.1016/0140-3664(86)90009-5.
Full textRadl, Alison, and Yu-Che Chen. "Computer Security in Electronic Government." International Journal of Electronic Government Research 1, no. 1 (2005): 79–99. http://dx.doi.org/10.4018/jegr.2005010105.
Full textDissertations / Theses on the topic "Electronic security"
Pao, Hua-Fu. "Security management of electronic data interchange." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1993. http://handle.dtic.mil/100.2/ADA272962.
Full textZhao, Weiliang, University of Western Sydney, of Science Technology and Environment College, and School of Computing and Information Technology. "Security techniques for electronic commerce applications." THESIS_CSTE_CIT_Zhao_W.xml, 2003. http://handle.uws.edu.au:8081/1959.7/127.
Full textZhao, Weiliang. "Security techniques for electronic commerce applications /." View thesis View thesis, 2003. http://library.uws.edu.au/adt-NUWS/public/adt-NUWS20030505.155156/index.html.
Full textGonzález, Calabuig Andreu. "Electronic Tongues for food and security applications." Doctoral thesis, Universitat Autònoma de Barcelona, 2018. http://hdl.handle.net/10803/643301.
Full textMarais, Terrence K. "Electronic payment and security on the Internet." Thesis, Stellenbosch : Stellenbosch University, 2002. http://hdl.handle.net/10019.1/52819.
Full textKhu-Smith, Vorpranee. "Enhancing the security of electronic commerce transactions." Thesis, Royal Holloway, University of London, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.406487.
Full textDeWitt, Alexander John Anthony George. "Usability issues with security of electronic mail." Thesis, Brunel University, 2007. http://bura.brunel.ac.uk/handle/2438/1059.
Full textCheang, Sek Lam. "Electronic commerce and security : risk identification and management." Thesis, University of Macau, 2001. http://umaclib3.umac.mo/record=b1636215.
Full textEriksson, Oskar, Kristian Maric, and Hans Olsberg. "Electronic Identification : Focus on bank services and security." Thesis, Jönköping University, Jönköping International Business School, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-62.
Full textRodrigues, Aniket. "SCADA security device: design and implementation." Thesis, Wichita State University, 2011. http://hdl.handle.net/10057/5195.
Full textBooks on the topic "Electronic security"
Shoniregun, Charles A. Electronic Healthcare Information Security. Springer Science+Business Media, LLC, 2010.
Find full textBailin, Paul, and Diana E. Kole. Electronic security: Products & system. Freedonia Group, 2000.
Find full textShoniregun, Charles A., Kudakwashe Dube, and Fredrick Mtenzi. Electronic Healthcare Information Security. Springer US, 2010. http://dx.doi.org/10.1007/978-0-387-84919-5.
Full textMartin, Vaughn. Electronic & microprocessor controlled security projects. Tab Books, 1985.
Find full textBook chapters on the topic "Electronic security"
Paul, Aidan. "Electronic Security." In Flemings. Macmillan Education UK, 1989. http://dx.doi.org/10.1007/978-1-349-10985-2_9.
Full textWeik, Martin H. "electronic security." In Computer Science and Communications Dictionary. Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_5999.
Full textFischer, Stephan, Achim Steinacker, Reinhard Bertram, and Ralf Steinmetz. "Electronic Commerce." In Open Security. Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/978-3-642-47643-3_8.
Full textWeik, Martin H. "electronic emission security." In Computer Science and Communications Dictionary. Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_5973.
Full textDe Soete, Marijke. "Electronic Cheque." In Encyclopedia of Cryptography and Security. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_285.
Full textBleumer, Gerrit. "Electronic Cash." In Encyclopedia of Cryptography and Security. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_197.
Full textBleumer, Gerrit. "Electronic Payment." In Encyclopedia of Cryptography and Security. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_198.
Full textBleumer, Gerrit. "Electronic Postage." In Encyclopedia of Cryptography and Security. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_199.
Full textBleumer, Gerrit. "Electronic Wallet." In Encyclopedia of Cryptography and Security. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_200.
Full textWirtz, Brigitte. "Biometric System Security." In Securing Electronic Business Processes. Vieweg+Teubner Verlag, 2004. http://dx.doi.org/10.1007/978-3-322-84982-3_12.
Full textConference papers on the topic "Electronic security"
Luxiong Xu, Na Wang, and Chenglian Liu. "Security of electronic ticketing." In 2010 International Conference On Computer and Communication Technologies in Agriculture Engineering (CCTAE). IEEE, 2010. http://dx.doi.org/10.1109/cctae.2010.5543314.
Full textManke, Gerald C. "Lasers in Electronic Warfare." In SPIE Security + Defence, edited by David H. Titterton, Mark A. Richardson, Robert J. Grasso, Willy L. Bohn, and Harro Ackermann. SPIE, 2014. http://dx.doi.org/10.1117/12.2073748.
Full textRoss, L. F. "Electronic Instrumentation and Security System." In 39th Annual Earthmoving Industry Conference. SAE International, 1988. http://dx.doi.org/10.4271/880797.
Full textXenakis, A., and A. Macintosh. "Procedural security in electronic voting." In 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the. IEEE, 2004. http://dx.doi.org/10.1109/hicss.2004.1265299.
Full textGiustolisi, Rosario, Gabriele Lenzini, and Giampaolo Bella. "What security for electronic exams?" In 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS). IEEE, 2013. http://dx.doi.org/10.1109/crisis.2013.6766348.
Full textSzapiel, Stan, Catherine Greenhalgh, Kevin Wagner, and Ryan Nobes. "Electronic eyebox for weapon sights." In SPIE Defense + Security, edited by Jay N. Vizgaitis, Bjørn F. Andresen, Peter L. Marasco, Jasbinder S. Sanghera, and Miguel P. Snyder. SPIE, 2016. http://dx.doi.org/10.1117/12.2228782.
Full textTrujillo, Eddie J., and Steven D. Ellersick. "Boeing electronic flight bag." In Defense and Security Symposium, edited by James C. Byrd, Daniel D. Desjardins, Eric W. Forsythe, and Henry J. Girolamo. SPIE, 2006. http://dx.doi.org/10.1117/12.668391.
Full textO'Regan, Terrance, and Philip Perconti. "2D electronic materials for army applications." In SPIE Defense + Security, edited by Thomas George, Achyut K. Dutta, and M. Saif Islam. SPIE, 2015. http://dx.doi.org/10.1117/12.2178401.
Full textPerju, Veacheslav L., David P. Casasent, Valeriy S. Feshchenko, and Lubov V. Feshchenko. "Optical-electronic technologies in materials analysis." In Defense and Security, edited by David P. Casasent and Tien-Hsin Chao. SPIE, 2005. http://dx.doi.org/10.1117/12.604321.
Full textSmith, Carl R., Robert Grasso, Jack Pledger, and Naveen Murarka. "Trends in electro-optical electronic warfare." In SPIE Security + Defence, edited by David H. Titterton and Mark A. Richardson. SPIE, 2012. http://dx.doi.org/10.1117/12.978652.
Full textReports on the topic "Electronic security"
Tracy, M. C., W. Jansen, and S. Bisker. Guidelines on electronic mail security. National Institute of Standards and Technology, 2002. http://dx.doi.org/10.6028/nist.sp.800-45.
Full textTracy, M. C., W. Jansen, K. A. Scarfone, and J. Butterfield. Guidelines on electronic mail security. National Institute of Standards and Technology, 2007. http://dx.doi.org/10.6028/nist.sp.800-45ver2.
Full textSaltman, Roy G. Good security practices for electronic commerce, including electronic data interchange. National Institute of Standards and Technology, 1993. http://dx.doi.org/10.6028/nist.sp.800-9.
Full textSmith, S. W., and P. S. Pedersen. Organizing electronic services into security taxonomies - revised. Office of Scientific and Technical Information (OSTI), 1997. http://dx.doi.org/10.2172/420392.
Full textHastings, Nelson, Rene Peralta, Stefan Popoveniuc, and Andrew Regenscheid. Security considerations for remote electronic UOCAVA voting. National Institute of Standards and Technology, 2011. http://dx.doi.org/10.6028/nist.ir.7770.
Full textRose, Scott, William Barker, Santos Jha, Chinedum Irrechukwu, and Karen Waltermire. Domain name system-based electronic mail security. National Institute of Standards and Technology, 2017. http://dx.doi.org/10.6028/nist.sp.1800-6.
Full textRegenscheid, Andrew, and Geoff Beier. Security best practices for the electronic transmission of election materials for UOCAVA voters. National Institute of Standards and Technology, 2011. http://dx.doi.org/10.6028/nist.ir.7711.
Full textNATIONAL COMMUNICATIONS SYSTEM WASHINGTON DC. The Electronic Intrusion Threat to National Security and Emergency Preparedness Telecommunications. An Awareness Document. Defense Technical Information Center, 1994. http://dx.doi.org/10.21236/ada301642.
Full textWASHINGTON UNIV ST LOUIS MO. The Electronic Intrusion Threat to National Security and Emergency Preparedness (NS/EP) Telecommunications. An Awareness Document. Defense Technical Information Center, 1999. http://dx.doi.org/10.21236/ada385372.
Full textPolyakova, Tatiyana An, Ignat S. Boychenko, and Nataliya An Troyan. Information and legal support of information security in the transport sector in the context of digital development. DOI CODE, 2021. http://dx.doi.org/10.18411/2021-0339-1001-46156.
Full text