Amanote Research
Register
Sign In
2 Fast 2 Secure: A Case Study of Post-Breach Security Changes
doi 10.1109/eurospw.2019.00028
Full Text
Open PDF
Abstract
Available in
full text
Date
June 1, 2019
Authors
Albese Demjaha
Tristan Caulfield
M. Angela Sasse
David Pym
Publisher
IEEE
Related search
Security Breach: The Case of TJX Companies, Inc.
Communications of the Association for Information Systems
Information Systems
Case Study 2: Cabinet of Curiosity
Journal of Writing in Creative Practice
Visual Arts
Performing Arts
Communication
An IND-CCA2 Secure Post-Quantum Encryption Scheme and a Secure Cloud Storage Use Case
Human-centric Computing and Information Sciences
Computer Science
2 Body Composition Changes in Obese Adolescents on a Protein Sparing Modified Fast
Pediatric Research
Child Health
Pediatrics
Perinatology
2 1/2 Proposals to Save Social Security
Southern Economic Journal
Economics
Econometrics
Electroencephalographic Changes in Type 2 Diabetes Mellitus During Hyperventilation and Post-Hyperventilation
International Journal of Advanced Research
A Study on Asymptomatic Cardiac Changes in Type 2 Diabetes Patients
Journal of Evidence Based Medicine and Healthcare
Fast Cryptography in Genus 2
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Case 2
Spinal Surgery