172
click to vote
AISM
15 years 1 months ago
2004
Electronic communications have become the most important kind of communications in business. However, trust, privacy and security have become the great challenges for business and...
142
click to vote
UIALL
15 years 5 months ago
2004 Springer
Abstract. The paper claims that processes for monitoring, assessing and ensuring appropriate levels of accessibility and usability have to be adopted by web development and mainten...
131
click to vote
TRUSTBUS
15 years 5 months ago
2004 Springer
Abstract. Synthetic data plays an important role in software testing. In this paper, we initiate the study of synthetic data generation models for the purpose of application softwa...
130
click to vote
SSWMC
15 years 1 months ago
2004
In spite of numerous advantages of biometrics-based personal authentication systems over traditional security systems based on token or knowledge, they are vulnerable to attacks t...
127
click to vote
ISI
15 years 5 months ago
2004 Springer
Through their misuse of authorized privileges, insiders have caused great damage and loss to corporate internal information assets, especially within the Intelligence Community (IC...
|