Sciweavers

347 search results - page 28 / 70
» Attacks on biometric systems: a case study in fingerprints
Sort
View
HICSS
2007
IEEE
140views Biometrics» more  HICSS 2007»
15 years 4 months ago
Coordination Network Analysis: A Research Framework for Studying the Organizational Impacts of Service-Orientation in Business I
Business intelligence (BI) technology and research is maturing. In evidence, some practitioners have indicated a shift in the nature of their data warehousing challenges from bein...
Mark Keith, Haluk Demirkan, Michael Goul
HICSS
2009
IEEE
154views Biometrics» more  HICSS 2009»
15 years 4 months ago
Follow The Sun Software Development: New Perspectives, Conceptual Foundation, and Exploratory Field Study
Follow The Sun (FTS) is a special case of global software development. FTS means that software work is handed off every day from one development site to the next -- many time zone...
Erran Carmel, Yael Dubinsky, J. Alberto Espinosa
CCS
2008
ACM
14 years 12 months ago
Information leaks in structured peer-to-peer anonymous communication systems
We analyze information leaks in the lookup mechanisms of structured peer-to-peer anonymous communication systems and how these leaks can be used to compromise anonymity. We show t...
Prateek Mittal, Nikita Borisov
USS
2010
14 years 7 months ago
Fighting Coercion Attacks in Key Generation using Skin Conductance
Many techniques have been proposed to generate keys including text passwords, graphical passwords, biometric data and etc. Most of these techniques are not resistant to coercion a...
Payas Gupta, Debin Gao
HICSS
2006
IEEE
86views Biometrics» more  HICSS 2006»
15 years 4 months ago
How Voluntary Online Learning Communities Emerge in Blended Courses
A comparative case study used content analysis to observe the emergence of voluntary online learning communities in two blended courses. The study developed an interaction-based a...
Robert Heckman, Qing Li, Xue Xiao