Sciweavers

747 search results - page 57 / 150
» TODS Special Issues
Sort
View
CARDIS
2000
Springer
110views Hardware» more  CARDIS 2000»
15 years 4 months ago
Biometrics, Access Control, Smart Cards: A not so Simple Combination
Although biometrics can be an useful component for access control, the security they procure is often overestimated, as if they were a magic tool whose simple use will automatical...
Gaël Hachez, François Koeune, Jean-Jac...
ER
1999
Springer
146views Database» more  ER 1999»
15 years 4 months ago
"Modeling-by-Patterns" of Web Applications
“A pattern ... describes a problem which occurs over and over again in our environment, and then describes the core of the solution to that problem, in such a way that you can us...
Franca Garzotto, Paolo Paolini, Davide Bolchini, S...
ACSAC
1998
IEEE
15 years 4 months ago
How to Increase Security in Mobile Networks by Anomaly Detection
The increasing complexity of cellular radio networks yields new demands concerning network security. Especially the task of detecting, repulsing and preventing abuse both by in- a...
Roland Büschkes, Dogan Kesdogan, Peter Reichl
NDSS
1998
IEEE
15 years 4 months ago
On the Problem of Trust in Mobile Agent Systems
Systems that support mobile agents are increasingly being used on the global Internet. Security concerns dealing with the protection of the execution environment from malicious ag...
Uwe G. Wilhelm, Sebastian Staamann, Levente Butty&...
VISUALIZATION
1998
IEEE
15 years 4 months ago
Progressive tetrahedralizations
This paper describes some fundamental issues for robust implementations of progressively refined tetrahedralizations generated through sequences of edge collapses. We address the ...
Oliver G. Staadt, Markus H. Gross