Sciweavers

1357 search results - page 202 / 272
» Controlling Access to Documents: A Formal Access Control Mod...
Sort
View
SIS
2004
13 years 10 months ago
Semantic Interoperability of Authorizations
The shift from paper documents to their respective electronic formats is producing important advantages in the functioning of businesses and Public Administrations. However, this s...
Mariemma Inmaculada Yagüe del Valle, Antonio ...
CHI
2010
ACM
14 years 3 months ago
Factors impeding Wiki use in the enterprise: a case study
Our research explored factors that impacted the use of wikis as a tool to support the dissemination of knowledge within an enterprise. Although we primarily talked to a population...
Lester J. Holtzblatt, Laurie E. Damianos, Daniel W...
ICASSP
2009
IEEE
14 years 3 months ago
Geometric distortion signatures for printer identification
We present a forensic technique for analyzing a printed image in order to trace the originating printer. Our method, which is applicable for commonly used electrophotographic (EP)...
Orhan Bulan, Junwen Mao, Gaurav Sharma
HICSS
2003
IEEE
119views Biometrics» more  HICSS 2003»
14 years 2 months ago
A First Person IP over HDSL Case Study
As many authors have articulated, the “last mile problem” is often cited as a persistent engineering obstacle in deploying residential broadband solutions. Additionally, some ...
Wayne Smith
CCS
2004
ACM
14 years 16 days ago
A PIN-entry method resilient against shoulder surfing
Magnetic stripe cards are in common use for electronic payments and cash withdrawal. Reported incidents document that criminals easily pickpocket cards or skim them by swiping the...
Volker Roth, Kai Richter, Rene Freidinger