Sign Up to like & get
recommendations!
1
Published in 2018 at "Health security"
DOI: 10.1089/hs.2018.0067
Abstract: Recent developments in synthetic biology tools and techniques are driving commercialization of a wide range of products for human health, agriculture, environmental stewardship, and other purposes. This article reviews some of the trends in synthetic…
read more here.
Keywords:
synthetic biology;
security implications;
biology applications;
biology ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2018 at "IEEE Micro"
DOI: 10.1109/mm.2018.032271065
Abstract: Cloud providers routinely schedule multiple applications per physical host to increase efficiency. The resulting interference on shared resources often leads to performance degradation and, more importantly, security vulnerabilities. Interference can leak important information about an…
read more here.
Keywords:
bolt;
cloud;
security implications;
implications cloud ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2017 at "IEEE Transactions on Information Forensics and Security"
DOI: 10.1109/tifs.2017.2705627
Abstract: While it is not recommended, Internet users tend to include personal information in their passwords for easy memorization. However, the use of personal information in passwords and its security implications have yet to be studied.…
read more here.
Keywords:
information;
passwords security;
information passwords;
security implications ... See more keywords