Sciweavers

4511 search results - page 754 / 903
» Observation Based System Security
Sort
View
67
Voted
HICSS
2005
IEEE
133views Biometrics» more  HICSS 2005»
15 years 3 months ago
Identifying Facilitators and Inhibitors of Market Structure Change: A Hybrid Theory of Unbiased Electronic Markets
The electronic markets hypothesis (EMH) in the information systems (IS) literature suggests that information technology (IT) will reduce coordination costs across firms, leading t...
Nelson F. Granados, Alok Gupta, Robert J. Kauffman
81
Voted
SDMW
2005
Springer
15 years 3 months ago
Metadata Management in Outsourced Encrypted Databases
Abstract. Database outsourcing is becoming increasingly popular introducing a new paradigm, called database-as-a-service, where a client’s database is stored at an external servi...
Ernesto Damiani, Sabrina De Capitani di Vimercati,...
84
Voted
ICCSA
2005
Springer
15 years 3 months ago
Mobile Mini-payment Scheme Using SMS-Credit
Mobile Phone has been widely used in the world and adopted in different application areas involved with SMS has been evolved for downloading logo, ring-tones, advertisement, secur...
Simon Fong, Edison Lai
96
Voted
AES
2004
Springer
135views Cryptology» more  AES 2004»
15 years 3 months ago
Some Algebraic Aspects of the Advanced Encryption Standard
Abstract. Since being officially selected as the new Advanced Encryption Standard (AES), Rijndael has continued to receive great attention and has had its security continuously eva...
Carlos Cid
98
Voted
WMASH
2003
ACM
15 years 3 months ago
Challenge: ubiquitous location-aware computing and the "place lab" initiative
To be widely adopted, location-aware computing must be as effortless, familiar and rewarding as web search tools like Google. We envisage the global scale Place Lab, consisting of...
Bill N. Schilit, Anthony LaMarca, Gaetano Borriell...