Sciweavers

347 search results - page 42 / 70
» Attacks on biometric systems: a case study in fingerprints
Sort
View
HICSS
2006
IEEE
103views Biometrics» more  HICSS 2006»
15 years 4 months ago
On the Role of Interpretation Schemes in Organizational IS Implementation
The objective of this study is to clarify how interpretation schemes held by people involved in organizational IS change affect implementation efforts and the outcomes of user par...
Minna Koskinen
HICSS
2003
IEEE
127views Biometrics» more  HICSS 2003»
15 years 3 months ago
SME E-Procurement Adoption in Hong Kong - The Roles of Power, Trust and Value
The objective of this research is to test a model of electronic procurement (e-procurement) adoption behavior by Small- to Medium-sized Enterprises (SME). We investigate the pheno...
Joyce K. Y. Chan, Matthew K. O. Lee
FSE
2011
Springer
263views Cryptology» more  FSE 2011»
14 years 1 months ago
Practical Near-Collisions on the Compression Function of BMW
Abstract. Blue Midnight Wish (BMW) is one of the fastest SHA-3 candidates in the second round of the competition. In this paper we study the compression function of BMW and we obta...
Gaëtan Leurent, Søren S. Thomsen
CCR
2011
14 years 5 months ago
Misbehaviors in TCP SACK generation
While analyzing CAIDA Internet traces of TCP traffic to detect instances of data reneging, we frequently observed seven misbehaviors in the generation of SACKs. These misbehaviors...
Nasif Ekiz, Abuthahir Habeeb Rahman, Paul D. Amer
HICSS
2010
IEEE
227views Biometrics» more  HICSS 2010»
14 years 10 months ago
Business Value Creation through Business Processes Management and Operational Business Intelligence Integration
Current approaches to Business Process Management (BPM) and Operational Business Intelligence (BI) integration have been very limited and simply reduced to the problem of technica...
Olivera Marjanovic