Sciweavers

335 search results - page 42 / 67
» Biometrics and Security
Sort
View
153
Voted
AVBPA
1997
Springer
140views Biometrics» more  AVBPA 1997»
15 years 6 months ago
Integrating Face Recognition into Security Systems
Automated processing of facial images has become a serious market for both hard- and software products. For the commercial success of face recognition systems it is most crucial th...
Volker Vetter, Thomas Zielke, Werner von Seelen
88
Voted
HICSS
2009
IEEE
117views Biometrics» more  HICSS 2009»
15 years 8 months ago
Information Security: User Precautions, Attacker Efforts, and Enforcement
We analyze the strategic interactions among endusers and between end-users and attackers in mass and targeted attacks. In mass attacks, precautions by endusers are strategic subst...
Ivan P. L. Png, Qiu-Hong Wang
98
Voted
HICSS
2007
IEEE
117views Biometrics» more  HICSS 2007»
15 years 8 months ago
Offering Mobile Security as a Service
The objective of this paper is to study how a software product company can expand its productbased business with the Software as a Service (SaaS) model into the mobile setting. We...
Aki Lassila
137
Voted
HICSS
2011
IEEE
196views Biometrics» more  HICSS 2011»
14 years 5 months ago
XTRec: Secure Real-Time Execution Trace Recording on Commodity Platforms
We propose XTRec, a primitive that can record the instruction-level execution trace of a commodity computing system. Our primitive is resilient to compromise to provide integrity ...
Amit Vasudevan, Ning Qu, Adrian Perrig
HICSS
2002
IEEE
132views Biometrics» more  HICSS 2002»
15 years 6 months ago
Secure Transmission of the Prescription Order Communication System Based on the Internet and the Public-Key Infrastructure Using
This research paper presents a new system's design and development of the prescription order communication system (POCS) based on the Internet between the hospital and the ph...
Won Jay Song, Byung-Ha Ahn