Sciweavers

61 search results - page 4 / 13
» Authentic Intervention in Information Systems Practice
Sort
View
DATE
2010
IEEE
182views Hardware» more  DATE 2010»
14 years 17 days ago
Fault-based attack of RSA authentication
For any computing system to be secure, both hardware and software have to be trusted. If the hardware layer in a secure system is compromised, not only it would be possible to ext...
Andrea Pellegrini, Valeria Bertacco, Todd M. Austi...
GAMESEC
2010
244views Game Theory» more  GAMESEC 2010»
13 years 5 months ago
The Password Game: Negative Externalities from Weak Password Practices
The combination of username and password is widely used as a human authentication mechanism on the Web. Despite this universal adoption and despite their long tradition, password s...
Sören Preibusch, Joseph Bonneau
PR
2010
220views more  PR 2010»
13 years 5 months ago
Online finger-knuckle-print verification for personal authentication
Biometric based personal authentication is an effective method for automatically recognizing, with a high confidence, a person’s identity. By observing that the texture pattern p...
Lin Zhang, Lei Zhang 0006, David Zhang, Hailong Zh...
EDOC
2006
IEEE
14 years 1 months ago
Business Continuity Model. Regeneration System for Manufacturing Components
At present, with the expansion of information technologies at the industry, it is vital to implant proactive, self-managed systems that ensure continuous operation and, therefore,...
Diego Marcos-Jorquera, Francisco Maciá P&ea...
BILDMED
2004
130views Algorithms» more  BILDMED 2004»
13 years 9 months ago
Prototyping a Planning System for Orbital Reconstruction
In the practice of maxillofacial surgery, one major challenge is the correct reconstruction of malformed or damaged bone structures of the face. Among those, a rather frequent task...
Jan Fischer, Melissa Mekic, Ángel del R&iac...