Sciweavers

335 search results - page 44 / 67
» Biometrics and Security
Sort
View
81
Voted
HICSS
2006
IEEE
122views Biometrics» more  HICSS 2006»
15 years 8 months ago
Reorganizing Government: Bhutan Visa Online
Centralized government document infrastructure and a policy commitment to transform the tourism sector to a more vivid and efficient business sector works as drivers for implement...
Kim Viborg Andersen, Helle Zinner Henriksen
ICDAR
2009
IEEE
15 years 8 months ago
Toward Resisting Forgery Attacks via Pseudo-Signatures
Recent work has shown that certain handwriting biometrics are susceptible to forgery attacks, both human- and machine-based. In this paper, we examine a new scheme for using handw...
Jin Chen, Daniel P. Lopresti, Fabian Monrose
HICSS
2003
IEEE
85views Biometrics» more  HICSS 2003»
15 years 7 months ago
Revisiting the Firewall Abolition Act
Mobility and the New Global Economy are accompanied by requirements for dynamism and flexibility, with respect to e-commerce, inter-organizational activity, and security. The clas...
Philip Robinson, Jochen Haller
HICSS
2009
IEEE
100views Biometrics» more  HICSS 2009»
15 years 8 months ago
A Theoretical Framework for Assessing Eavesdropping-Resistant Authentication Interfaces
A simple theoretical framework is developed to evaluate the security and usability of eavesdroppingresistant authentication schemes. Such schemes strive to allow users to authenti...
Bogdan Hoanca, Kenrick J. Mock
117
Voted
HICSS
2008
IEEE
155views Biometrics» more  HICSS 2008»
15 years 8 months ago
Pseudonymization for improving the Privacy in E-Health Applications
— Electronic health records (EHR) promise to improve communication between health care providers, thus leading to better quality of patients’ treatment and reduced costs. As hi...
Bernhard Riedl, Veronika Grascher, Stefan Fenz, Th...