Sciweavers

347 search results - page 27 / 70
» Attacks on biometric systems: a case study in fingerprints
Sort
View
HICSS
2006
IEEE
99views Biometrics» more  HICSS 2006»
15 years 4 months ago
Challenges of Treating Information as a Public Resource: The Case of Parcel Data
Land parcels are the foundation for many aspects of public and community life. This report presents the findings of a study of information about land parcels in New York State. It...
Sharon S. Dawes, Meghan E. Cook, Natalie Helbig
CCECE
2006
IEEE
15 years 4 months ago
Person Identification using Electrocardiograms
In this paper, the authors present an evaluation of a new biometric based on electrocardiogram (ECG) waveforms. ECG data were collected from 50 subjects during 3 data recordings s...
Adrian D. C. Chan, Mohyledin M. Hamdy, Armin Badre...
INFSOF
2007
83views more  INFSOF 2007»
14 years 9 months ago
On the design of more secure software-intensive systems by use of attack patterns
Retrofitting security implementations to a released software-intensive system or to a system under development may require significant architectural or coding changes. These late...
Michael Gegick, Laurie Williams
ATAL
2010
Springer
14 years 11 months ago
Model checking detectability of attacks in multiagent systems
Information security is vital to many multiagent system applications. In this paper we formalise the notion of detectability of attacks in a MAS setting and analyse its applicabil...
Ioana Boureanu, Mika Cohen, Alessio Lomuscio
HICSS
2003
IEEE
87views Biometrics» more  HICSS 2003»
15 years 3 months ago
Studying Teamwork in Global IT Support
As modern organizations increasingly operate in a global economy, they need IT support around the globe; favorable economic conditions also encourage the use of offshore IT teams....
Elizabeth Davidson, Albert S. M. Tay