Sciweavers

335 search results - page 52 / 67
» Biometrics and Security
Sort
View
HICSS
2009
IEEE
124views Biometrics» more  HICSS 2009»
15 years 8 months ago
Case Studies of an Insider Framework
Many groups are interested in the insider threat problem, but the model generally used by all of these groups is implicitly binary—one is either within a perimeter or not. There...
Matt Bishop, Sophie Engle, Sean Peisert, Sean Whal...
HICSS
2008
IEEE
148views Biometrics» more  HICSS 2008»
15 years 8 months ago
Consumer-Centric and Privacy-Preserving Identity Management for Distributed E-Health Systems
A new framework of privacy-preserving identity management for distributed e-Health systems is proposed. Utilizing a consumer-centric approach, the healthcare consumer maintains a ...
Richard Au, Peter Croll
113
Voted
ICPR
2008
IEEE
15 years 8 months ago
Topological structure-based alignment for fingerprint Fuzzy Vault
Because of the randomness of biometric features, traditional methods cannot perform well in the encryption of fingerprint template. The Fuzzy Vault construct is a biometric crypt...
Jianjie Li, Xin Yang, Jie Tian, Peng Shi, Peng Li
66
Voted
HICSS
2007
IEEE
99views Biometrics» more  HICSS 2007»
15 years 8 months ago
Delta Hedging Energy Portfolios: an Exploratory Study
1 Delta hedging, although widely used in commodity markets, needs to be further adapted to electricity markets. Given the extreme volatility of electricity prices, even a portfolio...
Richard Goldberg, James Read, Art Altman, Remi Aud...
89
Voted
GECCO
2007
Springer
170views Optimization» more  GECCO 2007»
15 years 8 months ago
An evolutionary keystroke authentication based on ellipsoidal hypothesis space
Keystroke authentication is a biometric method utilizing the typing characteristics of users. In this paper, we propose an evolutionary method for stable keystroke authentication....
Jae-Wook Lee, Sung-Soon Choi, Byung Ro Moon