Sciweavers

1511 search results - page 168 / 303
» Active Risk Estimation
Sort
View
CORR
2010
Springer
159views Education» more  CORR 2010»
13 years 8 months ago
Lightweight Mutual Authentication Protocol for Low Cost RFID Tags
Radio Frequency Identification (RFID) technology one of the most promising technologies in the field of ubiquitous computing. Indeed, RFID technology may well replace barcode tech...
Eslam Gamal Ahmed, Eman Shaaban, Mohamed Hashem
IPM
2010
134views more  IPM 2010»
13 years 6 months ago
Breakdowns in collaborative information seeking: A study of the medication process
Collaborative information seeking is integral to many professional activities. In hospital work, the medication process encompasses continual seeking for information and collaborat...
Morten Hertzum
JITECH
2010
117views more  JITECH 2010»
13 years 6 months ago
Understanding information disclosure behaviour in Australian Facebook users
The advent of social networking websites presents further opportunities for criminals to obtain information for use in identity theft, cyber-stalking, and worse activities. This p...
William Newk-Fon Hey Tow, Peter Dell, John Venable
ESORICS
2010
Springer
13 years 6 months ago
Speaker Recognition in Encrypted Voice Streams
Transmitting voice communication over untrusted networks puts personal information at risk. Although voice streams are typically encrypted to prevent unwanted eavesdropping, additi...
Michael Backes, Goran Doychev, Markus Dürmuth...
TIS
2010
131views Education» more  TIS 2010»
13 years 2 months ago
Cultivating Interaction Ubiquity at Work
: Since the invention of the electronic computer in the 1940s, technological development has resulted in dramatically increased processing power, storage capacity and communication...
Carsten Sørensen