Sciweavers

347 search results - page 16 / 70
» Attacks on biometric systems: a case study in fingerprints
Sort
View
USS
2008
15 years 6 days ago
The Practical Subtleties of Biometric Key Generation
The inability of humans to generate and remember strong secrets makes it difficult for people to manage cryptographic keys. To address this problem, numerous proposals have been s...
Lucas Ballard, Seny Kamara, Michael K. Reiter
HICSS
2003
IEEE
172views Biometrics» more  HICSS 2003»
15 years 3 months ago
Convergence Through Solution Interoperability: Case Study of Integrated Telecommunication Design and Incremental Deployment
Researchers have cogently presented the technical case for converged telecommunications systems. However, it is not clear how market-based telecommunications providers are embraci...
Thomas A. Horan, Benjamin L. Schooley
HICSS
2003
IEEE
120views Biometrics» more  HICSS 2003»
15 years 3 months ago
Evaluating On-line Learning Platforms: a Case Study
Our “information-oriented” society shows an increasing exigency of life-long learning. In such framework, online Learning is becoming an important tool to allow the flexibilit...
Francesco Colace, Massimo De Santo, Mario Vento
HICSS
2006
IEEE
115views Biometrics» more  HICSS 2006»
15 years 3 months ago
Enterprise Architecture Implementation and Management: A Case Study on Interoperability
The focus of this study is to explore why public agencies implement enterprise architecture programs and the interoperability challenges they are faced with when governing these p...
Kristian Hjort-Madsen
CORR
1998
Springer
184views Education» more  CORR 1998»
14 years 9 months ago
Case Study in Survivable Network System Analysis
This paper presents a method for analyzing the survivability of distributed network systems and an example of its application. Survivability is the capability of a system to fulfi...
Robert J. Ellison, Richard C. Linger, Thomas A. Lo...