Sciweavers

335 search results - page 46 / 67
» Biometrics and Security
Sort
View
100
Voted
HICSS
2002
IEEE
115views Biometrics» more  HICSS 2002»
15 years 6 months ago
Hermes--A Lean M-commerce Software Platform Utilizing Electronic Signatures
The world-wide growth of the mobile-telephony market opens the door for mobile commerce (m-commerce). For the restricted target platforms used for m-commerce such as mobile phones...
Sebastian Fischmeister, Günther Hagleitner, W...
HICSS
2012
IEEE
260views Biometrics» more  HICSS 2012»
13 years 9 months ago
Effort Estimates for Vulnerability Discovery Projects
Security vulnerabilities continue to be an issue in the software field and new severe vulnerabilities are discovered in software products each month. This paper analyzes estimates...
Teodor Sommestad, Hannes Holm, Mathias Ekstedt
117
Voted
PDCAT
2005
Springer
15 years 7 months ago
Trusted Computing-Based Security Architecture For 4G Mobile Networks
In this paper security requirements and security architecture for 4G systems are presented with the consideration of Trusted Computing (TC) for mobile equipment (ME). The security...
Yu Zheng, Dake He, Weichi Yu, Xiaohu Tang

Book
525views
16 years 9 months ago
Recent Advances in Face Recognition
"The main idea and the driver of further research in the area of face recognition are security applications and human-computer interaction. Face recognition represents an intu...
Kresimir Delac, Mislav Grgic and Marian Stewart Ba...
106
Voted
HICSS
2010
IEEE
237views Biometrics» more  HICSS 2010»
15 years 7 months ago
SafeFox: A Safe Lightweight Virtual Browsing Environment
1 The browser has become a popular attack vector for implanting code on computer operating systems. Equally critical, important sessions, such as online banking, must be protected ...
Jiang Wang, Yih Huang, Anup K. Ghosh