Sharing information with heightened security

被引:0
|
作者
Schoenberg, S
机构
关键词
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
引用
收藏
页码:84 / 84
页数:1
相关论文
共 50 条
  • [1] Biometric user authentication for heightened information security
    Xiao, QH
    BIOMETRIC AUTHENTICATION, PROCEEDINGS, 2004, 3072 : 708 - 715
  • [2] Information security and sharing
    Liddy, E.
    Online (Wilton, Connecticut), 2001, 25 (03):
  • [3] Information security and sharing
    Liddy, E
    ONLINE, 2001, 25 (03): : 28 - 30
  • [4] Sharing Network Security Information
    Walster, Dian
    TECHTRENDS, 2007, 51 (04) : 14 - 15
  • [5] ON THE SHARING OF CYBER SECURITY INFORMATION
    Luiijf, Eric
    Klaver, Marieke
    CRITICAL INFRASTRUCTURE PROTECTION IX, 2015, 466 : 29 - 46
  • [7] Rules in information sharing for security
    Chan, Janet
    Logan, Sarah
    Bennett Moses, Lyria
    CRIMINOLOGY & CRIMINAL JUSTICE, 2022, 22 (02) : 304 - 322
  • [8] Heightened security
    Print Prof., 2008, 8 (46-50):
  • [9] Labelling: Security in Information Management and Sharing
    Schotanus, Harm
    Hartog, Tim
    Hut, Hiddo
    Boonstra, Daniel
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2011, : 228 - 237
  • [10] The economic incentives for sharing security information
    Gal-Or, E
    Ghose, A
    INFORMATION SYSTEMS RESEARCH, 2005, 16 (02) : 186 - 208