Journal articles on the topic 'Electronic security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Electronic security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Cullinane, David. "Electronic Commerce Security." Information Systems Security 7, no. 3 (1998): 54–65. http://dx.doi.org/10.1201/1086/43300.7.3.19980901/31009.10.
Full textGifford, E. A. "Electronic information security." IEEE Potentials 7, no. 4 (1988): 26–30. http://dx.doi.org/10.1109/45.31568.
Full textKumar, Dr D. R. V. A. Sharath, N. Soumya, Bhukya Ramesh, and Thatikayala Sandeep. "Three Tire Security System for Electronic Voting Machine." International Journal of Psychosocial Rehabilitation 23, no. 1 (2019): 449–54. http://dx.doi.org/10.37200/ijpr/v23i1/pr190257.
Full textAi, Jing Feng. "Study and Design on Electronic Cash System Security Architecture." Advanced Materials Research 816-817 (September 2013): 962–66. http://dx.doi.org/10.4028/www.scientific.net/amr.816-817.962.
Full textBessler, Sandford. "Electronic Security und Privacy." e & i Elektrotechnik und Informationstechnik 127, no. 5 (2010): 115. http://dx.doi.org/10.1007/s00502-010-0729-y.
Full textKing, Christopher M. "Internet Electronic Mail Security." Information Systems Security 7, no. 2 (1998): 1–7. http://dx.doi.org/10.1201/1086/43303.7.2.19980601/31043.9.
Full textAmoroso, Edward, and Matthew Bishop. "Security enables electronic commerce." Journal of Network and Systems Management 4, no. 3 (1996): 247–49. http://dx.doi.org/10.1007/bf02139145.
Full textEkerbrink, Ivan. "Security of electronic transactions." Computers & Security 5, no. 2 (1986): 168. http://dx.doi.org/10.1016/0167-4048(86)90148-3.
Full textPrice, Wyn L. "Security in electronic mail." Computer Communications 9, no. 2 (1986): 96–99. http://dx.doi.org/10.1016/0140-3664(86)90009-5.
Full textRadl, Alison, and Yu-Che Chen. "Computer Security in Electronic Government." International Journal of Electronic Government Research 1, no. 1 (2005): 79–99. http://dx.doi.org/10.4018/jegr.2005010105.
Full textYAMANAKA, KIYOSHI. "Information Security and Electronic Commerce." Journal of the Institute of Electrical Engineers of Japan 117, no. 6 (1997): 365–68. http://dx.doi.org/10.1541/ieejjournal.117.365.
Full textWilk, Jarosław. "SECURITY OF COMPOSITE ELECTRONIC SERVICES." International Journal of New Computer Architectures and their Applications 5, no. 3 (2015): 127–40. http://dx.doi.org/10.17781/p001968.
Full textKovacich, Gerald. "Electronic-internet business and security." Computers & Security 17, no. 2 (1998): 129–35. http://dx.doi.org/10.1016/s0167-4048(97)81982-7.
Full textShain, Mike. "Security and electronic data interchange." Computer Audit Update 1990, no. 4 (1990): 4–12. http://dx.doi.org/10.1016/s0960-2593(05)80018-7.
Full textBahr, Alice Harrison. "Electronic Collection Security Systems Today." Library & Archival Security 11, no. 1 (1991): 3–22. http://dx.doi.org/10.1300/j114v11n01_02.
Full textLipton, J. D. "Security Interests in Electronic Databases." International Journal of Law and Information Technology 9, no. 1 (2001): 65–86. http://dx.doi.org/10.1093/ijlit/9.1.65.
Full textD'Angelo, Diana M., Bruce McNair, and Joseph E. Wilkes. "Security in Electronic Messaging Systems." AT&T Technical Journal 73, no. 3 (1994): 7–13. http://dx.doi.org/10.1002/j.1538-7305.1994.tb00584.x.
Full textGiraud, Bertrand. "Electronic surveillance — or security perverted." Science as Culture 1, no. 2 (1988): 120–30. http://dx.doi.org/10.1080/09505438809526203.
Full textAsti, Melinda, Ahmad Kamsyakawuni, and Kiswara Agung Santoso. "PENGAMANAN IMAGE DENGAN MODIFIKASI ALGORITMA ELECTRONIC CODE BOOK (ECB)." Majalah Ilmiah Matematika dan Statistika 18, no. 2 (2018): 91. http://dx.doi.org/10.19184/mims.v18i2.17252.
Full textWright, J. "Security? What security? [job security]." Engineering & Technology 4, no. 3 (2009): 80–81. http://dx.doi.org/10.1049/et.2009.0321.
Full textWajong, Andre Michael Ricky, and Carolina Rizki Putri. "Keamanan Dalam Electronic Commerce." ComTech: Computer, Mathematics and Engineering Applications 1, no. 2 (2010): 867. http://dx.doi.org/10.21512/comtech.v1i2.2623.
Full textHaas, David J. "Electronic Security Screening: Its Origin with Aviation Security 1968–1973." Journal of Applied Security Research 5, no. 4 (2010): 460–532. http://dx.doi.org/10.1080/19361610.2010.505778.
Full textGong, Song Jie, and Lin Di Jin. "Research on Electronic Cash Security Technology in Electronic Commerce." Advanced Materials Research 846-847 (November 2013): 1628–31. http://dx.doi.org/10.4028/www.scientific.net/amr.846-847.1628.
Full textNaserasadi, Ali. "Authors Security in Electronic Learning Systems." International Journal of Computer Applications 21, no. 10 (2011): 25–29. http://dx.doi.org/10.5120/2617-3458.
Full textSng, Y. N., C. Quek, and S. Foo. "Security in computational electronic mail systems." Information Services & Use 17, no. 4 (1997): 283–94. http://dx.doi.org/10.3233/isu-1997-17409.
Full textHassan, Md Arif, Zarina Shukur, Mohammad Kamrul Hasan, and Ahmed Salih Al-Khaleefa. "A Review on Electronic Payments Security." Symmetry 12, no. 8 (2020): 1344. http://dx.doi.org/10.3390/sym12081344.
Full textMcClure, Ben. "Can security pierce the electronic veil?" Computers & Security 17, no. 2 (1998): 157. http://dx.doi.org/10.1016/s0167-4048(97)82006-8.
Full textYang, Liyan. "Security Management of Electronic Reading Room." Procedia Engineering 15 (2011): 5598–600. http://dx.doi.org/10.1016/j.proeng.2011.08.1039.
Full textMason, Stephen. "Electronic Security is a Continuous Process." Computer Fraud & Security 2003, no. 1 (2003): 13–15. http://dx.doi.org/10.1016/s1361-3723(03)01013-3.
Full textDallas, Dennis A. "Electronic Commerce Security on the Internet." Information Systems Security 7, no. 1 (1998): 1–9. http://dx.doi.org/10.1201/1086/43302.7.1.19980301/31032.12.
Full textLabuschagne, L., and J. H. P. Eloff. "Electronic commerce: the information‐security challenge." Information Management & Computer Security 8, no. 3 (2000): 154–57. http://dx.doi.org/10.1108/09685220010372582.
Full textMcCartney, Patricia R. "HIPAA and Electronic Health Information Security." MCN, The American Journal of Maternal/Child Nursing 28, no. 5 (2003): 333. http://dx.doi.org/10.1097/00005721-200309000-00015.
Full textJacobson, Robert V. "Electronic Data Processing Security—An Overview." International Journal of Network Management 6, no. 2 (1996): 77–93. http://dx.doi.org/10.1002/(sici)1099-1190(199603/04)6:2<77::aid-nem184>3.0.co;2-7.
Full textRöhrig, Susanne, and Konstantin Knorr. "Security Analysis of Electronic Business Processes." Electronic Commerce Research 4, no. 1/2 (2004): 59–81. http://dx.doi.org/10.1023/b:elec.0000009282.06809.c5.
Full textTsai, Flora S. "Security and privacy in electronic passports." International Journal of Biometrics 3, no. 2 (2011): 114. http://dx.doi.org/10.1504/ijbm.2011.039414.
Full textRubin, Aviel D. "Security considerations for remote electronic voting." Communications of the ACM 45, no. 12 (2002): 39–44. http://dx.doi.org/10.1145/585597.585599.
Full textSuwarjono, Suwarjono, Lilik Sumaryanti, and Lusia Lamalewa. "Cryptography Implementation for electronic voting security." E3S Web of Conferences 328 (2021): 03005. http://dx.doi.org/10.1051/e3sconf/202132803005.
Full textKim, Min Su. "A Study on the Measures for the Development of Electronic Security in the 4th Industrial Revolution Era." Jouranl of Information and Security 20, no. 3 (2020): 109–14. http://dx.doi.org/10.33778/kcsa.2020.20.3.109.
Full textHa, Kyung-Su, Cheol-Kyu Cho, and Pyong-Soo Kim. "Electronic Security Control Center Building Process and Security and Management Measures." Journal of the Korea Society of Computer and Information 20, no. 5 (2015): 113–21. http://dx.doi.org/10.9708/jksci.2015.20.5.113.
Full textMostert, Hanri. "Tenure Security Reformand Electronic Registration: Exploring Insights from English Law." Potchefstroom Electronic Law Journal/Potchefstroomse Elektroniese Regsblad 14, no. 3 (2017): 84. http://dx.doi.org/10.17159/1727-3781/2011/v14i3a2577.
Full textQ.H., Hasan, Ali A. Yassin, and Oğuz ATA. "Electronic Health Records System Using Blockchain Technology." Webology 18, SI05 (2021): 580–93. http://dx.doi.org/10.14704/web/v18si05/web18248.
Full textTarigan, Philipus Tarigan. "Use of Electronic Code Book (Ecb) Algorithm in File Security." Jurnal Info Sains : Informatika dan Sains 10, no. 1 (2020): 19–23. http://dx.doi.org/10.54209/infosains.v10i1.28.
Full textSingh, Arunabh. "Cyber Security Frameworks." International Journal for Research in Applied Science and Engineering Technology 10, no. 1 (2022): 590–99. http://dx.doi.org/10.22214/ijraset.2022.39843.
Full textVYHANIAILO, Svitlana. "Aspects of economic security of electronic commerce." Economics. Finances. Law, no. 4 (April 29, 2021): 28–30. http://dx.doi.org/10.37634/efp.2021.4.5.
Full textWin, Khin Than. "A Review of Security of Electronic Health Records." Health Information Management 34, no. 1 (2005): 13–18. http://dx.doi.org/10.1177/183335830503400105.
Full textRauf, Sarwat, Inayat Kalim, and Muhammad Mubeen. "Impact of Electronic Media on Pakistan’s Security." Global Social Sciences Review III, no. I (2018): 434–46. http://dx.doi.org/10.31703/gssr.2018(iii-i).25.
Full textSharma, Anuradha, Praveen Kumar Misra, and Puneet Misra. "A Security Measure for Electronic Business Applications." International Journal of Computer Applications 102, no. 7 (2014): 12–16. http://dx.doi.org/10.5120/17826-8612.
Full textMcNichol, Kathleen S., Marilyn Greenstein, and Todd M. Feinman. "Electronic Commerce: Security, Risk Management and Control." Journal of Risk and Insurance 68, no. 2 (2001): 371. http://dx.doi.org/10.2307/2678109.
Full textDessai, Kissan Gauns. "SECURITY ANALYSIS OF CONVENTIONAL/ELECTRONIC SUMMATIVE ASSESSMENTS." International Journal of Advanced Research in Computer Science 9, no. 1 (2018): 155–62. http://dx.doi.org/10.26483/ijarcs.v9i1.5276.
Full textKapis, Kosmas. "Security Modeling for Protecting Electronic Patients’ Consent." International Journal of Cyber-Security and Digital Forensics 8, no. 2 (2019): 152–65. http://dx.doi.org/10.17781/p002576.
Full text