Sciweavers

61 search results - page 3 / 13
» Authentic Intervention in Information Systems Practice
Sort
View
CCS
2006
ACM
13 years 11 months ago
Fortifying password authentication in integrated healthcare delivery systems
Integrated Delivery Systems (IDSs) now become a primary means of care provision in healthcare domain. However, existing password systems (under either the single-server model or t...
Yanjiang Yang, Robert H. Deng, Feng Bao
IDTRUST
2010
ACM
14 years 2 months ago
Practical and secure trust anchor management and usage
Public Key Infrastructure (PKI) security depends upon secure management and usage of trust anchors. Unfortunately, widely used mechanisms, management models and usage practices re...
Carl Wallace, Geoff Beier
CSCW
2006
ACM
14 years 1 months ago
From the war room to the living room: decision support for home-based therapy teams
Teams of therapists often provide targeted interventions for children with developmental disabilities. A common practice in these cases is one-on-one interaction between a therapi...
Julie A. Kientz, Gillian R. Hayes, Gregory D. Abow...
MLMI
2005
Springer
14 years 29 days ago
Can Chimeric Persons Be Used in Multimodal Biometric Authentication Experiments?
Combining multiple information sources, typically from several data streams is a very promising approach, both in experiments and to some extents in various real-life applications....
Norman Poh, Samy Bengio
USENIX
2001
13 years 8 months ago
Heimdal and Windows 2000 Kerberos - How to Get Them to Play Together
As a practical means of achieving better security and single sign-on, the Kerberos network authentication system has been in wide use in the Unix world for many years. Microsoft h...
Assar Westerlund, Johan Danielsson