Sciweavers

1422 search results - page 46 / 285
» Information security and risk management
Sort
View
ISW
2009
Springer
14 years 3 months ago
On the Security of Identity Based Ring Signcryption Schemes
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Ra...
DIM
2006
ACM
14 years 16 days ago
Securing user inputs for the web
Jan Camenisch, Abhi Shelat, Dieter Sommer, Roger Z...
ACSAC
2003
IEEE
14 years 2 months ago
Protecting Personal Data: Can IT Security Management Standards Help?
Compelled to improve information security by the introduction of personal data protection legislation, organizations worldwide are adopting standardized security management guidel...
Giovanni Iachello
CONTEXT
2007
Springer
14 years 3 months ago
Risk Context Effects in Inductive Reasoning: An Experimental and Computational Modeling Study
Mechanisms that underlie the inductive reasoning process in risk contexts are investigated. Experimental results indicate that people rate the same inductive reasoning argument dif...
Kayo Sakamoto, Masanori Nakagawa