Sciweavers

1587 search results - page 45 / 318
» Security Patterns and Secure Systems Design Using UML
Sort
View
FC
2007
Springer
119views Cryptology» more  FC 2007»
15 years 4 months ago
Improving Usability by Adding Security to Video Conferencing Systems
Many video conferencing solutions exist in the market today and many new ones are being introduced. In striving to provide an experience to users as close to “being there” as p...
April Slayden Mitchell, Alan H. Karp
LOCA
2009
Springer
15 years 4 months ago
LOCK: A Highly Accurate, Easy-to-Use Location-Based Access Control System
With proliferation of ubiquitous computing, digital access is facing an increasing risk since unauthorized client located at any place may intrude a local server. Location Based Ac...
Yongcai Wang, Junhui Zhao, Toshikazu Fukushima
SIGADA
2004
Springer
15 years 3 months ago
Information systems security engineering: a critical component of the systems engineering lifecycle
The purpose of this research paper is to illustrate the industrial and federal need for Information Systems Security Engineering (ISSE) in order to build Information Assurance (IA...
James F. Davis
ETRICS
2006
15 years 1 months ago
On the Use of Word Networks to Mimicry Attack Detection
Intrusion detection aims at raising an alarm any time the security of an IT system gets compromised. Though highly successful, Intrusion Detection Systems are all susceptible of mi...
Fernando Godínez, Dieter Hutter, Raul Monro...
MCS
2004
Springer
15 years 3 months ago
High Security Fingerprint Verification by Perceptron-Based Fusion of Multiple Matchers
Recent works about perceptron-based fusion of multiple fingerprint matchers showed the effectiveness of such approach in improving the performance of personal identity verification...
Gian Luca Marcialis, Fabio Roli