Sciweavers

11 search results - page 2 / 3
» The Practical Subtleties of Biometric Key Generation
Sort
View
IJNSEC
2011
272views more  IJNSEC 2011»
13 years 7 days ago
Trust Key Management Scheme for Wireless Body Area Networks
With recent advances in wireless sensor networks and embedded computing technologies, miniaturized pervasive health monitoring devices have become practically feasible. In additio...
Mohammed Mana, Mohammed Feham, Boucif Amar Bensabe...
ACNS
2010
Springer
172views Cryptology» more  ACNS 2010»
13 years 8 months ago
Secure Sketch for Multiple Secrets
Secure sketches are useful in extending cryptographic schemes to biometric data since they allow recovery of fuzzy secrets under inevitable noise. In practice, secrets derived from...
Chengfang Fang, Qiming Li, Ee-Chien Chang
HICSS
2008
IEEE
161views Biometrics» more  HICSS 2008»
13 years 11 months ago
IT Business Alignment as Governance Tool for Firm-Internal Relationship Quality: A Longitudinal Case Study
Many business processes are relying on a smooth and flexible IT support. A major finding of IS research is that in order to generate value from IT the complementarities between IT...
Heinz-Theo Wagner, Tim Weitzel
HICSS
2008
IEEE
180views Biometrics» more  HICSS 2008»
13 years 11 months ago
Systems Theory and Knowledge Management Systems: The Case of Pratt-Whitney Rocketdyne
Abstract. Despite a growing body of research on knowledge management (KM) systems, many managers are still unsure how they can implement a KM system that will effectively contribut...
Mark Chun, Kiho Sohn, Priscilla Arling, Nelson F. ...
HICSS
2003
IEEE
112views Biometrics» more  HICSS 2003»
13 years 10 months ago
Learning Through Telemedicine Networks
Telemedicine is advocated for its potential to improve the accessibility and quality of health care delivery while lowering costs [1]. Although the potential benefits of telemedic...
Liqiong Deng, Marshall Scott Poole