Sciweavers

5119 search results - page 206 / 1024
» Security Privacy
Sort
View
ICASSP
2010
IEEE
15 years 4 months ago
Privacy and security of features extracted from minutiae aggregates
This paper describes our recent analysis on the security and privacy of biometric feature vectors obtained from fingerprint minutiae. A large number of contiguous regions (cuboid...
Abhishek Nagar, Shantanu Rane, Anthony Vetro
IEEEARES
2007
IEEE
15 years 10 months ago
CASSIS - Computer-based Academy for Security and Safety in Information Systems
Information technologies and society are highly interwoven nowadays, but in both, the private and business sector, users are often not aware of security issues or lack proper secu...
Gernot Goluch, Andreas Ekelhart, Stefan Fenz, Stef...
REFSQ
2010
Springer
15 years 6 months ago
Towards a Framework to Elicit and Manage Security and Privacy Requirements from Laws and Regulations
[Context and motivation] The increasing demand of software systems to process and manage sensitive information has led to the need that software systems should comply with relevant...
Shareeful Islam, Haralambos Mouratidis, Stefan Wag...
PERCOM
2007
ACM
16 years 4 months ago
Physically Unclonable Function-Based Security and Privacy in RFID Systems
Radio Frequency Identification (RFID) is an increasingly popular technology that uses radio signals for object identification. Tracking and authentication in RFID tags have raised...
Leonid Bolotnyy, Gabriel Robins
IEEEARES
2009
IEEE
15 years 11 months ago
An Architectural Foundation for Security Model Sharing and Reuse
Within the field of software security we have yet to find efficient ways on how to learn from past mistakes and integrate security as a natural part of software development. Th...
Per Håkon Meland, Shanai Ardi, Jostein Jense...