Sciweavers

335 search results - page 28 / 67
» Biometrics and Security
Sort
View
COST
2009
Springer
155views Multimedia» more  COST 2009»
15 years 8 months ago
Multi-biometric Fusion for Driver Authentication on the Example of Speech and Face
Nowadays biometrics becomes an important field in IT security, safety and comfort research for automotive. Aims are automatic driver authentication or recognition of spoken command...
Tobias Scheidat, Michael Biermann, Jana Dittmann, ...
110
Voted
HICSS
2009
IEEE
151views Biometrics» more  HICSS 2009»
15 years 8 months ago
Integrating Formal Analysis and Design to Preserve Security Properties
The use of formal methods has long been advocated in the development of secure systems. Yet, methods for deriving design from requirements that guarantee retention of the intended...
Riham Hassan, Shawn A. Bohner, Sherif El-Kassas, M...
HICSS
2010
IEEE
487views Biometrics» more  HICSS 2010»
15 years 8 months ago
A Survey of Game Theory as Applied to Network Security
Network security is a complex and challenging problem. The area of network defense mechanism design is receiving immense attention from the research community for more than two de...
Sankardas Roy, Charles Ellis, Sajjan Shiva, Dipank...
HICSS
2007
IEEE
104views Biometrics» more  HICSS 2007»
15 years 8 months ago
Employees' Behavior towards IS Security Policy Compliance
The literature agrees that the major threat to IS security is constituted by careless employees who do not comply with organizations’ IS security policies and procedures. To add...
Seppo Pahnila, Mikko T. Siponen, M. Adam Mahmood
82
Voted
HICSS
1998
IEEE
135views Biometrics» more  HICSS 1998»
15 years 6 months ago
The Architecture of Secure Systems
Secure system design, veri cation and validation is often a daunting task, involving the merger of various protection mechanisms in conjunction with system security policy and con...
Jim Alves-Foss