Sciweavers

536 search results - page 48 / 108
» Embedding Information Security into the Organization
Sort
View
CCS
2007
ACM
14 years 2 months ago
Hardware-rooted trust for secure key management and transient trust
We propose minimalist new hardware additions to a microprocessor chip that protect cryptographic keys in portable computing devices which are used in the field but owned by a cen...
Jeffrey S. Dwoskin, Ruby B. Lee
ISBI
2009
IEEE
14 years 2 months ago
Automatic Segmentation of Head Structures on Fetal MRI
Recent improvements of fetal MRI acquisitions now allow threedimensional segmentation of fetal structures, to extract biometrical measures for pregnancy follow-up. Automation of t...
Jérémie Anquez, Elsa D. Angelini, Is...
HICSS
1999
IEEE
267views Biometrics» more  HICSS 1999»
14 years 12 days ago
Annotate: A Web-based Knowledge Management Support System for Document Collections
Knowledge management is an increasingly important source of competitive advantage for organizations. Knowledge is a renewable, re-usable and accumulating asset of value to firms t...
Mark Ginsburg, Ajit Kambil
ACSAC
2010
IEEE
13 years 6 months ago
Keeping data secret under full compromise using porter devices
We address the problem of confidentiality in scenarios where the attacker is not only able to observe the communication between principals, but can also fully compromise the commu...
Christina Pöpper, David A. Basin, Srdjan Capk...
ICPR
2008
IEEE
14 years 2 months ago
Remote multimodal biometric authentication using bit priority-based fragile watermarking
We propose a new remote multimodal biometric authentication framework based on fragile watermarking for transferring multi-biometrics over networks to server for authentication. A...
Tuan Hoang, Dat Tran, Dharmendra Sharma