184
Voted
AISM
15 years 2 months ago
2004
Electronic communications have become the most important kind of communications in business. However, trust, privacy and security have become the great challenges for business and...
149
Voted
UIALL
15 years 6 months ago
2004 Springer
Abstract. The paper claims that processes for monitoring, assessing and ensuring appropriate levels of accessibility and usability have to be adopted by web development and mainten...
144
Voted
SSWMC
15 years 2 months ago
2004
In spite of numerous advantages of biometrics-based personal authentication systems over traditional security systems based on token or knowledge, they are vulnerable to attacks t...
141
Voted
TRUSTBUS
15 years 6 months ago
2004 Springer
Abstract. Synthetic data plays an important role in software testing. In this paper, we initiate the study of synthetic data generation models for the purpose of application softwa...
138
Voted
ISI
15 years 6 months ago
2004 Springer
Through their misuse of authorized privileges, insiders have caused great damage and loss to corporate internal information assets, especially within the Intelligence Community (IC...
|