Sciweavers

110 search results - page 12 / 22
» Biometric Security Systems: Fingerprint and Speech Technolog...
Sort
View
81
Voted
IEEECIT
2006
IEEE
15 years 5 months ago
One Touch Logon: Replacing Multiple Passwords with Single Fingerprint Recognition
— User authentication is still heavily reliant on the use of passwords, and the security problems associated with passwords are becoming more and more serious. The main causes of...
Beomsoo Park, Sungjin Hong, Jaewook Oh, Heejo Lee,...
CORR
2010
Springer
110views Education» more  CORR 2010»
14 years 11 months ago
Advanced Software Protection Now
We introduce a novel software-protection method, which can be fully implemented with today's technologies, that provides traitor tracing and license-enforcement functionalitie...
Diego Bendersky, Ariel Futoransky, Luciano Notarfr...
92
Voted
HICSS
2007
IEEE
215views Biometrics» more  HICSS 2007»
15 years 6 months ago
A Metrics Generation Model for Measuring the Control Objectives of Information Systems Audit
Information Technology governance (ITG) which was a relatively new concept in the late 1990s, has gained importance in the 21st century due to factors namely the collapse of Enron...
Mathew Nicho, Brian Cusack
ICDAR
2005
IEEE
15 years 5 months ago
A Study on Vulnerability in On-line Writer Verification System
The analysis of vulnerabilities and threats in biometrics-based personal authentication systems is indispensable for the development and promotion of wide spread utilization of bi...
Yasushi Yamazaki, Akane Nakashima, Kazunobu Tasaka...
HICSS
2007
IEEE
108views Biometrics» more  HICSS 2007»
15 years 6 months ago
Addressing IT Security for Critical Control Systems
— Control systems for critical infrastructures like national power grids make increasingly use of open technologies and protocols, and the Internet. In this environment, the risk...
Martin Naedele