Sciweavers

95 search results - page 13 / 19
» Credit Card Forensics
Sort
View
ICEIS
2002
IEEE
15 years 4 months ago
DIDAFIT: Detecting Intrusions in Databases Through Fingerprinting Transactions
: The most valuable information assets of an organization are often stored in databases and it is pertinent for such organizations to ensure the integrity and confidentiality of t...
Wai Lup Low, Joseph Lee, Peter Teoh
ACSAC
2000
IEEE
15 years 4 months ago
Efficient Commerce Protocols based on One-Time Pads
We present a new commerce protocol that allows customers and merchants to conduct face-to-face creditcard authorizations with a credit card company securely with the option of ano...
Michael A. Schneider, Edward W. Felten
IH
1998
Springer
15 years 3 months ago
Biometric yet Privacy Protecting Person Authentication
Many eligibility or entitlement certificates in every day life are non-transferable between persons. However, they are usually implemented by personal physical tokens that owners c...
Gerrit Bleumer
KDD
1998
ACM
200views Data Mining» more  KDD 1998»
15 years 3 months ago
Fast Computation of 2-Dimensional Depth Contours
"Oneperson's noise is another person's signal." For manyapplications, including the detection of credit card frauds and the monitoringof criminal activities in...
Theodore Johnson, Ivy Kwok, Raymond T. Ng
CHI
1994
ACM
15 years 3 months ago
The alphaslider: a compact and rapid selector
Research has suggested that rapid, serial, visual presentation of text (RSVP) may be an effective way to scan and search through lists of text strings in search of words, names, e...
Christopher Ahlberg, Ben Shneiderman