Sciweavers

61 search results - page 1 / 13
» Authentic Intervention in Information Systems Practice
Sort
View
ECIS
2000
13 years 6 months ago
Authentic Intervention in Information Systems Practice
In this paper the philosophical concept of authenticity is used as a framing device for providing an interpretation of aspects of both ethical and practical action on the part of i...
Robert A. Stephens, Stephen K. Probert
ECIS
2001
13 years 6 months ago
The Participatory Paradigm for Applied Information Systems Research
Information systems research continues to be criticised for the fundamental gap between theory and practice. Critics argue that this is largely the result of the methodological in...
Karin Breu, Joe Peppard
WMASH
2003
ACM
13 years 10 months ago
Secure authentication system for public WLAN roaming
A serious challenge for seamless roaming between independent wireless LANs (WLANs) is how best to confederate the various WLAN service providers, each having different trust relat...
Yasuhiko Matsunaga, Ana Sanz Merino, Takashi Suzuk...
IBPRIA
2003
Springer
13 years 9 months ago
A User Authentication Technic Using a~Web Interaction Monitoring System
User authentication based on biometrics has explored both physiological and behavioral characteristics. We present a system, called Web Interaction Display and Monitoring (WIDAM), ...
Hugo Gamboa, Ana L. N. Fred
CCS
2007
ACM
13 years 10 months ago
Universally composable and forward-secure RFID authentication and authenticated key exchange
Recently, a universally composable framework for RFID authentication protocols providing availability, anonymity, and authenticity was proposed. In this paper we extend that frame...
Tri Van Le, Mike Burmester, Breno de Medeiros