Sciweavers

59 search results - page 7 / 12
» A Study on the Convergence of FingerHashing and a Secured Bi...
Sort
View
DAC
2003
ACM
14 years 8 months ago
Design flow for HW / SW acceleration transparency in the thumbpod secure embedded system
This paper describes a case study and design flow of a secure embedded system called ThumbPod, which uses cryptographic and biometric signal processing acceleration. It presents t...
David Hwang, Bo-Cheng Lai, Patrick Schaumont, Kazu...
HICSS
2005
IEEE
115views Biometrics» more  HICSS 2005»
14 years 1 months ago
Exploring the Psychological Determinants of Perceived Ease of Use and Usefulness
The question of why individuals adopt a particular information system is an important issue in IS research. While extensive prior research has established that the Technology Acce...
Bryan A. Reinicke, George M. Marakas
HICSS
2006
IEEE
143views Biometrics» more  HICSS 2006»
14 years 1 months ago
The Role of External Influences on Organizational Information Security Practices: An Institutional Perspective
This paper describes the initial findings of a case study intended to identify important organizational catalysts and impediments to implementing and using security technologies a...
Qing Hu, Paul Hart, Donna Cooke
HICSS
2008
IEEE
167views Biometrics» more  HICSS 2008»
14 years 2 months ago
An Operational Framework for Service Oriented Architecture Network Security
: This study proposes a new operational framework for Service Oriented Architecture (SOA) network security. It seeks to characterize the current state of practices in SOA network s...
Robert Bunge, Sam Chung, Barbara Endicott-Popovsky...
HICSS
2007
IEEE
117views Biometrics» more  HICSS 2007»
14 years 1 months ago
Offering Mobile Security as a Service
The objective of this paper is to study how a software product company can expand its productbased business with the Software as a Service (SaaS) model into the mobile setting. We...
Aki Lassila