Sciweavers

335 search results - page 29 / 67
» Biometrics and Security
Sort
View
117
Voted
HICSS
2007
IEEE
113views Biometrics» more  HICSS 2007»
15 years 8 months ago
Secure Software Engineering: A New Paradigm
Software defects lead to security vulnerabilities, which are costing businesses millions of dollars each year and threaten the security of individuals and the nation. It can be de...
Wm. Arthur Conklin, Glenn B. Dietrich
121
Voted
ACNS
2008
Springer
147views Cryptology» more  ACNS 2008»
15 years 8 months ago
Multi-factor Authenticated Key Exchange
Abstract. In order to increase the security for authenticated key exchange protocols, various authentication means can be used together. In this paper, we introduce a security mode...
David Pointcheval, Sébastien Zimmer
HICSS
2006
IEEE
75views Biometrics» more  HICSS 2006»
15 years 8 months ago
Computer Security Risks in the Internet Era: Are Small Business Owners Aware and Proactive?
This article empirically examines the awareness, concern, and actions of home-based small business owners regarding Internet-based computer security risks. A scientific, Internet-...
David W. Johnson, Harold Koch
92
Voted
HICSS
2006
IEEE
82views Biometrics» more  HICSS 2006»
15 years 8 months ago
A Preliminary Investigation of the Impact of the Sarbanes-Oxley Act on Information Security
This paper examines the information security implications of the Sarbanes-Oxley (SOX) Act of 2002. It is well-established in the information systems field that managers do not ran...
Janine L. Spears, Robert J. Cole
100
Voted
HICSS
2007
IEEE
108views Biometrics» more  HICSS 2007»
15 years 8 months ago
Addressing IT Security for Critical Control Systems
— Control systems for critical infrastructures like national power grids make increasingly use of open technologies and protocols, and the Internet. In this environment, the risk...
Martin Naedele