咨询与建议

限定检索结果

文献类型

  • 4 篇 期刊文献

馆藏范围

  • 4 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4 篇 工学
    • 4 篇 计算机科学与技术...

主题

  • 3 篇 cybersecurity
  • 1 篇 .net framework
  • 1 篇 2fa
  • 1 篇 microarchitectur...
  • 1 篇 memory hygiene
  • 1 篇 blockchain
  • 1 篇 key finding atta...
  • 1 篇 microprocessors
  • 1 篇 cryptography
  • 1 篇 secure coding
  • 1 篇 bitcoin
  • 1 篇 cryptocurrencies
  • 1 篇 distibuted ledge...
  • 1 篇 cryptanalysis
  • 1 篇 memory dump anal...
  • 1 篇 multi-factor aut...

机构

  • 3 篇 school of comput...
  • 1 篇 institute of tec...
  • 1 篇 letterkenny inst...
  • 1 篇 ulster universit...

作者

  • 4 篇 kevin curran
  • 1 篇 shaun mc brearty
  • 1 篇 benjamin ashby s...
  • 1 篇 william farrelly
  • 1 篇 dylan rafferty
  • 1 篇 joseph williamso...

语言

  • 4 篇 英文
检索条件"作者=Kevin Curran"
4 条 记 录,以下是1-10 订阅
排序:
The Role of Blockchain in Cyber Security
收藏 引用
Semiconductor Science and Information Devices 2021年 第1期3卷 1-9页
作者: Dylan Rafferty kevin curran School of Computing Engineering&Intelligent SystemsUlster UniversityUK
2021 Cyber security breaches are on the rise globally.Due to the introduction of legislation like the EU’s General Data Protection Regulation(GDPR),companies are now subject to further financial penalties if they fai... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
The Role of Multi-factor Authentication for Modern Day Security
收藏 引用
Semiconductor Science and Information Devices 2021年 第1期3卷 16-23页
作者: Joseph Williamson kevin curran School of Computing Engineering&Intelligent SystemsUlster UniversityUK
Multi-factor Authentication(MFA)often referred to as Two-factor Authen­tication(2FA),which is a subset of MFA,is the practice of implementing additional security methods on top of a standard username and password to h... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Security Vulnerabilities in Microprocessors
收藏 引用
Semiconductor Science and Information Devices 2021年 第1期3卷 24-32页
作者: Benjamin Ashby Smith kevin curran School of Computing Engineering&Intelligent SystemsUlster UniversityUK
Microprocessors such as those found in PCs and smartphones are complex in their design and nature.In recent years,an increasing number of security vulnerabilities have been found within these microprocessors that can ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Extracting Cryptographic Keys *** Applications
收藏 引用
Semiconductor Science and Information Devices 2021年 第2期3卷 1-11页
作者: Shaun Mc Brearty william Farrelly kevin curran Institute of Technology SligoIreland Letterkenny Institute of Technology LetterkennyIreland Ulster University DerryUnited Kingdom
In the absence of specialized encryption hardware,cryptographic operationsmust be performed in main memory.As such,it is common place for cybercriminals to examine the content of main memory with a view to retrievingh... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论