Sciweavers

561 search results - page 21 / 113
» An Investigation Into Computer Forensic Tools
Sort
View
MEDIAFORENSICS
2010
14 years 10 months ago
Biometric template transformation: a security analysis
One of the critical steps in designing a secure biometric system is protecting the templates of the users that are stored either in a central database or on smart cards. If a biom...
Abhishek Nagar, Karthik Nandakumar, Anil K. Jain
LISA
2008
15 years 2 months ago
Designing Tools for System Administrators: An Empirical Test of the Integrated User Satisfaction Model
System administrators are unique computer users. As power users in complex and high-risk work environments, intuition tells us that they may have requirements of the tools they us...
Nicole F. Velasquez, Suzanne P. Weisband, Alexandr...
INFOSECCD
2006
ACM
15 years 5 months ago
Is attack better than defense?: teaching information security the right way
A recent trend in security education is towards teaching offensive techniques which were originally developed by hackers. This reflects tendencies in the professional world where ...
Martin Mink, Felix C. Freiling
CHINZ
2006
ACM
15 years 5 months ago
Virtual and augmented reality as spatial ability training tools
Virtual reality (VR) and augmented reality (AR – overlaying virtual objects onto the real world) offer interesting and wide spread possibilities to study different components of...
Andreas Dünser, Karin Steinbügl, Hannes ...
BCSHCI
2007
15 years 1 months ago
Figuring configuration: "everyday" users and end-user configuration of pervasive computing environments
The research outlined investigates strategies that nonprogramming or “everyday” users may take in interaction with a Pervasive Computing Environment within relevant domains sp...
Thom Heslop