Academic literature on the topic 'Security paper'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security paper.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Security paper"
Marsh, P. "Paper defence [security]." Information Professional 2, no. 1 (2005): 34–37. http://dx.doi.org/10.1049/inp:20050105.
Full textKaur, Ravneet, and Rekha Bhatia. "Review Paper on Cloud Security." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 5 (2017): 743–46. http://dx.doi.org/10.23956/ijarcsse/v7i5/0119.
Full textDAVIS, E. H., A. W. DILNOT, and J. A. KAY. "The Social Security Green Paper." Fiscal Studies 6, no. 3 (1985): 1–8. http://dx.doi.org/10.1111/j.1475-5890.1985.tb00403.x.
Full textAnsumansamal et al.,, Ansumansamal et al ,. "A Review Paper on Food Security." International Journal of Mechanical and Production Engineering Research and Development 10, no. 3 (2020): 9575–82. http://dx.doi.org/10.24247/ijmperdjun2020913.
Full textBertino, Elisa. "Security of cellular networks position paper." CCF Transactions on Networking 3, no. 2 (2020): 93–96. http://dx.doi.org/10.1007/s42045-020-00037-8.
Full textHinduja, Ankita, and Pradip Sharma. "A Survey Paper on Password Security Techniques." International Journal of Computer Sciences and Engineering 7, no. 10 (2019): 130–36. http://dx.doi.org/10.26438/ijcse/v7i10.130136.
Full textBenqdara, Salima, and Abdelfattah Mahmoud. "Wireless Security in Libya: A Survey Paper." International Journal of Computer Applications 181, no. 35 (2019): 26–31. http://dx.doi.org/10.5120/ijca2019918309.
Full textStoukatch, O., A. Shelupanov, and E. Goloivn. "Student paper contest on Information Security SIBINFO." IEEE Communications Magazine 42, no. 2 (2004): 27–30. http://dx.doi.org/10.1109/mcom.2003.1267088.
Full textMayes, Keith E., and Konstantinos Markantonakis. "Mobile communication security controllers an evaluation paper." Information Security Technical Report 13, no. 3 (2008): 173–92. http://dx.doi.org/10.1016/j.istr.2008.09.004.
Full textKaminska, Aleksandra. "Don’t copy that: Security printing and the making of high-tech paper." Convergence: The International Journal of Research into New Media Technologies 25, no. 4 (2019): 590–606. http://dx.doi.org/10.1177/1354856519845748.
Full textDissertations / Theses on the topic "Security paper"
Desmaisons, Johanna. "Use of nanocellulose for security paper." Thesis, Université Grenoble Alpes (ComUE), 2018. http://www.theses.fr/2018GREAI055.
Full textOfficer, Simon J. "Alternative strategies for security labelling/encoding of paper and plastic products." Thesis, Robert Gordon University, 2005. http://hdl.handle.net/10059/983.
Full textMogale, Miemie. "Information security assurance model for an examination paper preparation process in a higher education institution." Thesis, Nelson Mandela Metropolitan University, 2016. http://hdl.handle.net/10948/8509.
Full textAshburn, Hunter Lee. "The 2016 "White Paper on German Security Policy and the Future of the Bundeswehr": An Analysis of its Positioning, Reception, and Conditions of Implementation." Scholarship @ Claremont, 2017. http://scholarship.claremont.edu/cmc_theses/1454.
Full textEriksson, Matilda. "Anställdas förvärv av värdepapper : Beskattningstidpunkten när förvärvet är förenat med förfoganderättsinskränkningar." Thesis, Jönköping University, JIBS, Commercial Law, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-12261.
Full textReed, Randall. "Dehydrated national security water scarcity, the emerging threat of the 21st century /." CLICK HERE TO VIEW:, 2004. https://research.maxwell.af.mil/papers/ay2004/ari/Reed.pdf.
Full textCucu, Dan. "Romanian Special Forces : identifying appropriate missions and organizational structure /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Dec%5FCucu.pdf.
Full textSchultz, Timothy Paul. "Biopolitik a practical assessment of future biowarfare /." CLICK HERE TO VIEW:, 2004. https://research.maxwell.af.mil/papers/ay2004/ari/schultz.pdf.
Full textBaptista, Gualter Barbas. "Bridging environmental conflicts with social metabolism : forestry expansion and socioeconomic change." Doctoral thesis, FCT - UNL, 2010. http://hdl.handle.net/10362/5891.
Full textTůma, Jan. "Emisní povolenka jako cenný papír a investiční nástroj." Master's thesis, Vysoká škola ekonomická v Praze, 2009. http://www.nusl.cz/ntk/nusl-16055.
Full textBooks on the topic "Security paper"
Khȯdȯlmȯriĭn I︠A︡am Mongolia. Niĭgmiĭn Khamgaalal. Social security sector strategy paper. Govt. of Mongolia, Ministry of Social Welfare and Labour, 2003.
Find full textDuggan, A. J. National Vehicle Security Register Project: Discussion paper. The Council, 1995.
Find full textNational Association of Women and the Law. Economic security for farm women: A discussion paper. The Association, 1995.
Find full textImproving social security in Canada.: A supplementary paper. Govt. of Canada, 1994.
Find full textNorthern Ireland. Assembly. Health and Social Services Committee. Green paper on the reform of social security. HMSO, 1985.
Find full textNorthern Ireland. Assembly. Health and Social Services Committee. Green paper on the reform of social security. HMSO, 1985.
Find full textCanada. Human Resources Development Canada. Improving social security in Canada: Discussion paper summary. Supply and Services Canada, 1994.
Find full textRoll, Jo. Family trends and social security reform: Briefing paper. Family Policy Studies Centre, 1986.
Find full textCanada. Human Resources Development Canada. Improving social security in Canada: A discussion paper. Human Resources Development Canada, 1994.
Find full textBook chapters on the topic "Security paper"
Halder, Biswajit, Rajkumar Darbar, Utpal Garain, and Abhoy Ch Mondal. "Analysis of Fluorescent Paper Pulps for Detecting Counterfeit Indian Paper Money." In Information Systems Security. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-13841-1_23.
Full textDas, Manik Lal, and Ravi Mukkamala. "Revisiting Bluetooth Security (Short Paper)." In Information Systems Security. Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-89862-7_10.
Full textSudmann, Nils P. "Position paper: Security in TACOMA." In Object-Oriented Technology: ECOOP’98 Workshop Reader. Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/3-540-49255-0_80.
Full textGiordano, Joseph. "Position Paper on DBMS Security." In Research Directions in Database Security. Springer New York, 1992. http://dx.doi.org/10.1007/978-1-4612-2870-7_23.
Full textNitschke, Łukasz. "Secure Internet Voting Based on Paper Ballots." In Information Systems Security. Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-89862-7_7.
Full textBonneau, Joseph. "Hostile Blockchain Takeovers (Short Paper)." In Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2019. http://dx.doi.org/10.1007/978-3-662-58820-8_7.
Full textHerley, Cormac. "Justifying Security Measures — a Position Paper." In Computer Security – ESORICS 2017. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-66402-6_2.
Full textvan Staalduinen, M., J. C. A. van der Lubbe, E. Backer, and P. Paclík. "Paper Retrieval Based on Specific Paper Features: Chain and Laid Lines." In Multimedia Content Representation, Classification and Security. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11848035_46.
Full textAcharya, Anasuya, Manoj Prabhakaran, and Akash Trehan. "An Introduction to the CellTree Paradigm (Invited Paper)." In Information Systems Security. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-36945-3_8.
Full textJakobsson, Markus. "Short Paper: Addressing Sophisticated Email Attacks." In Financial Cryptography and Data Security. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-70972-7_17.
Full textConference papers on the topic "Security paper"
Chia, Vincent, Pieter Hartel, Qingze Hum, et al. "Rethinking Blockchain Security: Position Paper." In 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE, 2018. http://dx.doi.org/10.1109/cybermatics_2018.2018.00222.
Full textSheard, Judy. "Session details: Paper Session: Security." In SIGCSE '16: The 47th ACM Technical Symposium on Computing Science Education. ACM, 2016. http://dx.doi.org/10.1145/3260409.
Full textRobillard, Jean J. "Interactive paper as security substrate." In First International Conference on Interactive Paper, edited by Graham G. Allan and Jean J. Robillard. SPIE, 1997. http://dx.doi.org/10.1117/12.280779.
Full textRadic, Stojan. "Multibanded parametric processing (Invited Paper)." In Defense and Security, edited by Andrew R. Pirich, Michael J. Hayduk, Eric J. Donkor, and Peter J. Delfyett, Jr. SPIE, 2005. http://dx.doi.org/10.1117/12.606950.
Full textJalali, Bahram, Rick C. J. Hsu, and Akhil R. Shah. "Coherent optical MIMO (Invited Paper)." In Defense and Security, edited by Andrew R. Pirich, Michael J. Hayduk, Eric J. Donkor, and Peter J. Delfyett, Jr. SPIE, 2005. http://dx.doi.org/10.1117/12.607013.
Full textDonofrio, Robert L. "Update on display aging (Invited Paper)." In Defense and Security, edited by Darrel G. Hopper, Eric W. Forsythe, David C. Morton, Charles E. Bradford, and Henry J. Girolamo. SPIE, 2005. http://dx.doi.org/10.1117/12.601812.
Full textFranks, Erin. "Advanced warfighter machine interface (Invited Paper)." In Defense and Security, edited by Darrel G. Hopper, Eric W. Forsythe, David C. Morton, Charles E. Bradford, and Henry J. Girolamo. SPIE, 2005. http://dx.doi.org/10.1117/12.605740.
Full textFirester, Arthur H., and Michael G. Kane. "Macroelectronics: a progress report (Invited Paper)." In Defense and Security, edited by Darrel G. Hopper, Eric W. Forsythe, David C. Morton, Charles E. Bradford, and Henry J. Girolamo. SPIE, 2005. http://dx.doi.org/10.1117/12.603880.
Full textGilmore, John F. "Machine learning in exploitation (Invited Paper)." In Defense and Security, edited by Edmund G. Zelnio and Frederick D. Garber. SPIE, 2005. http://dx.doi.org/10.1117/12.609895.
Full textAllen, John G. "Dynamic networked combat capability (Invited Paper)." In Defense and Security. SPIE, 2005. http://dx.doi.org/10.1117/12.608665.
Full textReports on the topic "Security paper"
King, J. IEEE 802.11 Wireless LAN Security White Paper. Office of Scientific and Technical Information (OSTI), 2001. http://dx.doi.org/10.2172/15005940.
Full textMaslowski, J. I. Normalization of U.S.-Vietnam Relations Regional Security Policy Paper. Defense Technical Information Center, 1994. http://dx.doi.org/10.21236/ada440538.
Full textKuca, Michal. IDD: ISO Standard Paper for IAEA Radiological Security Conference. Office of Scientific and Technical Information (OSTI), 2018. http://dx.doi.org/10.2172/1760406.
Full textTRANSPORTATION SYSTEMS CENTER CAMBRIDGE MA. OSD CALS Architecture Master Plan Study. Concept Paper. Security. Volume 38. Defense Technical Information Center, 1989. http://dx.doi.org/10.21236/ada265284.
Full textNetzer, Colonel Gideon. Cooperative Monitoring Center Occasional Paper/7: A Generic Model for Cooperative Border Security. Office of Scientific and Technical Information (OSTI), 1999. http://dx.doi.org/10.2172/6982.
Full textShaw, Jonathan E. The Role of Religion in National Security Policy Since September 11, 2001(Carlisle Paper). Defense Technical Information Center, 2011. http://dx.doi.org/10.21236/ada537011.
Full textQojas, M. Cooperative Monitoring Center Occasional Paper/8: Cooperative Border Security for Jordan: Assessment and Options. Office of Scientific and Technical Information (OSTI), 1999. http://dx.doi.org/10.2172/6122.
Full textBankus, Brent, and Marcela Ramirez. USSOUTHCOM Interagency Meeting on Food Security (CSL Issue Paper, Volume 11-09, July 2009). Defense Technical Information Center, 2009. http://dx.doi.org/10.21236/ada509072.
Full textRamirez, Marcela, and Kent Butts. Climate Change, Adaptation and Security in Central America and the Caribbean (CSL Issue Paper, Volume 3-11). Defense Technical Information Center, 2011. http://dx.doi.org/10.21236/ada540588.
Full textButts, Kent H., Brent Bankus, and Adam Norris. Strategic Minerals: Is China's Consumption a Threat to United States Security? (CSL Issue Paper, Volume 7-11, July 2011). Defense Technical Information Center, 2011. http://dx.doi.org/10.21236/ada548775.
Full text