— User authentication is still heavily reliant on the use of passwords, and the security problems associated with passwords are becoming more and more serious. The main causes of...
Beomsoo Park, Sungjin Hong, Jaewook Oh, Heejo Lee,...
We introduce a novel software-protection method, which can be fully implemented with today's technologies, that provides traitor tracing and license-enforcement functionalitie...
Diego Bendersky, Ariel Futoransky, Luciano Notarfr...
Information Technology governance (ITG) which was a relatively new concept in the late 1990s, has gained importance in the 21st century due to factors namely the collapse of Enron...
The analysis of vulnerabilities and threats in biometrics-based personal authentication systems is indispensable for the development and promotion of wide spread utilization of bi...
— Control systems for critical infrastructures like national power grids make increasingly use of open technologies and protocols, and the Internet. In this environment, the risk...