Sciweavers

347 search results - page 29 / 70
» Attacks on biometric systems: a case study in fingerprints
Sort
View
HICSS
2002
IEEE
151views Biometrics» more  HICSS 2002»
15 years 2 months ago
The Study of Information System Development (ISD) Process from the Perspectives of Power Development Stage and Organizational Po
This paper is to study the information system development (ISD) by looking into fifty-six cases from the perspectives of power development stage and organizational politics. We in...
Ling-hsing Chang, Tung-Ching Lin, Sheng Wu
IS
2007
14 years 9 months ago
Security Attack Testing (SAT) - testing the security of information systems at design time
For the last few years a considerable number of efforts have been devoted into integrating security issues into information systems development practices. This has led to a number...
Haralambos Mouratidis, Paolo Giorgini
CCS
2009
ACM
15 years 10 months ago
On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers
The man-in-the-middle (MITM) attack has been shown to be one of the most serious threats to the security and trust of existing VoIP protocols and systems. For example, the MITM wh...
Ruishan Zhang, Xinyuan Wang, Ryan Farley, Xiaohui ...
TASE
2009
IEEE
15 years 4 months ago
Coarse Grained Retrenchment and the Mondex Denial of Service Attacks
Retrenchment is a framework that allows relatively unrestricted system evolution steps to be described in a way that gives an evolution step some formal content — unlike model b...
Richard Banach
HICSS
2006
IEEE
160views Biometrics» more  HICSS 2006»
15 years 4 months ago
Mobile RFID - A Case from Volvo on Innovation in SCM
Utilization of Radio Frequency Identification (RFID) is often presented as improving supply chain management even though there are still few in-depth studies that support the hype...
Magnus Holmqvist, Gunnar Stefansson