Sciweavers

335 search results - page 30 / 67
» Biometrics and Security
Sort
View
HICSS
2011
IEEE
203views Biometrics» more  HICSS 2011»
14 years 5 months ago
Will HITECH Heal Patient Data Hemorrhages?
Hemorrhages of confidential patient health data create privacy and security concerns. While the US HIPAA legislation on privacy and security went into effect over five years ago, ...
M. Eric Johnson, Nicholas D. Willey
HICSS
2005
IEEE
144views Biometrics» more  HICSS 2005»
15 years 7 months ago
Secure Dynamic Source Routing
— In this paper we present the Secure Dynamic Source Routing protocol for Mobile Ad hoc Networks that prevents a lot of potential attacks to these kind of networks. We also prese...
Frank Kargl, Alfred Geiss, Stefan Schlott, Michael...
HICSS
2011
IEEE
386views Biometrics» more  HICSS 2011»
14 years 5 months ago
Cloud Hooks: Security and Privacy Issues in Cloud Computing
In meteorology, the most destructive extratropical cyclones evolve with the formation of a bent-back front and cloud head separated from the main polar-front, creating a hook that...
Wayne A. Jansen
HICSS
2006
IEEE
100views Biometrics» more  HICSS 2006»
15 years 8 months ago
e-Government and Cyber Security: The Role of Cyber Security Exercises
e-Government operations are increasing with citizen demand for timely and cost effective services. Security associated with individual systems is similar to many e-commerce soluti...
Art Conklin, Gregory B. White
100
Voted
HICSS
2005
IEEE
140views Biometrics» more  HICSS 2005»
15 years 7 months ago
On Contamination in Information Ecosystems
1 On the Internet, digitally active small and medium sized enterprises (SME) face numerous security risks. When SMEs join networks, business ideas and malicious activities may inte...
Bengt Carlsson, Andreas Jacobsson