Sciweavers

61 search results - page 4 / 13
» Authentic Intervention in Information Systems Practice
Sort
View
DATE
2010
IEEE
182views Hardware» more  DATE 2010»
15 years 4 months ago
Fault-based attack of RSA authentication
For any computing system to be secure, both hardware and software have to be trusted. If the hardware layer in a secure system is compromised, not only it would be possible to ext...
Andrea Pellegrini, Valeria Bertacco, Todd M. Austi...
GAMESEC
2010
244views Game Theory» more  GAMESEC 2010»
14 years 9 months ago
The Password Game: Negative Externalities from Weak Password Practices
The combination of username and password is widely used as a human authentication mechanism on the Web. Despite this universal adoption and despite their long tradition, password s...
Sören Preibusch, Joseph Bonneau
PR
2010
220views more  PR 2010»
14 years 10 months ago
Online finger-knuckle-print verification for personal authentication
Biometric based personal authentication is an effective method for automatically recognizing, with a high confidence, a person’s identity. By observing that the texture pattern p...
Lin Zhang, Lei Zhang 0006, David Zhang, Hailong Zh...
EDOC
2006
IEEE
15 years 5 months ago
Business Continuity Model. Regeneration System for Manufacturing Components
At present, with the expansion of information technologies at the industry, it is vital to implant proactive, self-managed systems that ensure continuous operation and, therefore,...
Diego Marcos-Jorquera, Francisco Maciá P&ea...
83
Voted
BILDMED
2004
130views Algorithms» more  BILDMED 2004»
15 years 1 months ago
Prototyping a Planning System for Orbital Reconstruction
In the practice of maxillofacial surgery, one major challenge is the correct reconstruction of malformed or damaged bone structures of the face. Among those, a rather frequent task...
Jan Fischer, Melissa Mekic, Ángel del R&iac...