Sciweavers

335 search results - page 36 / 67
» Biometrics and Security
Sort
View
HICSS
2010
IEEE
203views Biometrics» more  HICSS 2010»
15 years 8 months ago
Secure Planning of Order Picking Systems with the Aid of Simulation
Planning a new logistics center is a quite difficult job. Depending on the requirements there are a great number of possible design versions. The planner has to consider not only ...
Alexander Ulbrich, Stefan Galka, Willibald A. G&uu...
HICSS
2005
IEEE
124views Biometrics» more  HICSS 2005»
15 years 7 months ago
Information Policy, Data Mining, and National Security: False Positives and Unidentified Negatives
Since 9/11, intelligence agencies in the United States have expanded experimentation and use of data mining and analysis techniques to combat terrorism. These efforts have generat...
Terrence A. Maxwell
IICS
2001
Springer
15 years 6 months ago
Hardware Security Concept for Spontaneous Network Integration of Mobile Devices
In this article we introduce an architecture of a mobile device that enables safe and authenticated data-transmission in a spontaneously configured network environment. The usage ...
Igor Sedov, Marc Haase, Clemens H. Cap, Dirk Timme...
EV
2008
63views Hardware» more  EV 2008»
15 years 3 months ago
Secure Remote Voter Registration
: Voter registration is an important issue in election processes. In order to protect the election accuracy, it is necessary to have an accurate electoral roll of eligible voters. ...
Victor Morales-Rocha, Jordi Puiggali, Miguel Soria...
HICSS
2003
IEEE
134views Biometrics» more  HICSS 2003»
15 years 7 months ago
Secure Connections in Bluetooth Scatternets
Bluetooth is a wireless networking technology specifically developed for Personal Area Networking and other short range applications. Bluetooth devices can be networked together ...
Karl E. Persson, D. Manivannan