Sciweavers

149 search results - page 7 / 30
» Coding Solutions for the Secure Biometric Storage Problem
Sort
View
62
Voted
ICNS
2008
IEEE
15 years 4 months ago
Reliable Evidence of Data Integrity from an Untrusted Storage Service
Digital storage demand is growing with the increasing use of digital artifacts from media files to business documents. Regulatory frameworks ask for unaltered, durable storage of...
Claudius Stern, Philipp Adelt, Volker Krummel, Mar...
COLCOM
2007
IEEE
15 years 4 months ago
Kademlia for data storage and retrieval in enterprise networks
— Centralized organization of current enterprise networks doesn’t represent an ideal solution in terms of information security and reliability. Denial of service, packet filter...
Natalya Fedotova, Stefano Fanti, Luca Veltri
HICSS
2002
IEEE
107views Biometrics» more  HICSS 2002»
15 years 2 months ago
Insurability of Electronic Commerce Risks
New kinds of risks increasingly threaten electronic commerce. The traditional instrument for risk transfer is insurance. Research is needed to determine whether new Internet risks...
Torsten Grzebiela
SISW
2005
IEEE
15 years 3 months ago
Adding Secure Deletion to Your Favorite File System
Files or even their names often contain confidential or secret information. Most users believe that such information is erased as soon as they delete a file. Even those who know...
Nikolai Joukov, Erez Zadok
HICSS
2006
IEEE
140views Biometrics» more  HICSS 2006»
15 years 3 months ago
Programming Education in the Era of the Internet: A Paradigm Shift
Over the last several years, the Computer Science (CS) community has put a great deal of effort in to the area of security research, and have made great advances. Counterintuitive...
Scott Harrison, Nadine Hanebutte, Jim Alves-Foss