Sciweavers

347 search results - page 50 / 70
» Attacks on biometric systems: a case study in fingerprints
Sort
View
IFIP
2005
Springer
15 years 3 months ago
Probable Innocence Revisited
In this paper we propose a formalization of probable innocence, a notion of probabilistic anonymity that is associated to “realistic” protocols such as Crowds. We analyze crit...
Konstantinos Chatzikokolakis, Catuscia Palamidessi
HICSS
2009
IEEE
74views Biometrics» more  HICSS 2009»
15 years 4 months ago
Unleashing Mobility in the Organization: A Time-Geography Perspective
The increased fluidity and agility of organizations demand the smooth mediation of information technology (IT) between user and task. As rigid hierarchies are giving way to open, ...
Douglas M. Schutz, Yong-Young Kim, Youngjin Yoo
HICSS
2003
IEEE
260views Biometrics» more  HICSS 2003»
15 years 3 months ago
Automating Land Management: An Interpretive Analysis of Information Technology Management within the Bureau of Land Management
Given societies’ massive investment in information technology and the potentially catastrophic consequences of IT failures, it is becoming increasingly critical to understand ho...
John C. Beachboard
CSFW
2010
IEEE
15 years 1 months ago
Towards a Formal Foundation of Web Security
—We propose a formal model of web security based straction of the web platform and use this model to analyze the security of several sample web mechanisms and applications. We id...
Devdatta Akhawe, Adam Barth, Peifung E. Lam, John ...
HICSS
2007
IEEE
105views Biometrics» more  HICSS 2007»
15 years 4 months ago
A Visualization Framework for Task-Oriented Modeling Using UML
— The UML is a collection of 13 diagram notations to describe different views of a software system. The existing diagram types display model elements and their relations. Softwar...
Christian F. J. Lange, Martijn A. M. Wijns, Michel...