Sciweavers

347 search results - page 66 / 70
» Attacks on biometric systems: a case study in fingerprints
Sort
View
TMC
2011
164views more  TMC 2011»
14 years 4 months ago
Security Games for Vehicular Networks
—Vehicular networks (VANETs) can be used to improve transportation security, reliability, and management. This paper investigates security aspects of VANETs within a game-theoret...
Tansu Alpcan, Sonja Buchegger
HICSS
1994
IEEE
141views Biometrics» more  HICSS 1994»
15 years 2 months ago
Empirical CATeam Research in Meetings
Meeting research and especially research on Computer Supported Meetings of natural teams is not available in abundance. What is reported of meetings often uses a rather limited th...
Helmut Krcmar, Henrik Lewe, Gerhard Schwabe
HICSS
2010
IEEE
225views Biometrics» more  HICSS 2010»
15 years 4 months ago
A Comparative Analysis of Professional Forums in the United States Army and Hybrid Communities of Practice in the Civilian Secto
Communities of practice (COPs) have been around since the founding of the first social networks many millennia ago. Organizations around the world over the last two decades have l...
Jon Brickey, Steven Walczak
HICSS
2003
IEEE
136views Biometrics» more  HICSS 2003»
15 years 3 months ago
Value Positions for Financial Institutions in Electronic Bill Presentment and Payment (EBPP)
Business to consumer (B2C) electronic commerce has led to new relationships connecting various supply chain partners via the Internet, significantly increasing the quantity and qu...
Alea M. Fairchild
SIGECOM
2008
ACM
151views ECommerce» more  SIGECOM 2008»
14 years 9 months ago
Security and insurance management in networks with heterogeneous agents
Computer users express a strong desire to prevent attacks and to reduce the losses from computer and information security breaches. However, security compromises are common and wi...
Jens Grossklags, Nicolas Christin, John Chuang