Sciweavers

1265 search results - page 53 / 253
» Finding the Key to a Synapse
Sort
View
AINA
2007
IEEE
14 years 4 months ago
An Improved Approach to Secure Authentication and Signing
We know how to build secure systems but for security measures to be truly effective it is necessary to use keys which are far too large for people to commit to memory. The consequ...
David Argles, Alex Pease, Robert John Walters
HICSS
2003
IEEE
127views Biometrics» more  HICSS 2003»
14 years 3 months ago
Designed for Success - Empirical Evidence on Features of Corporate Web Pages
We investigate how eight concepts derived from the media characteristics of the WWW impact corporate success in E-Business if implemented as features of companies’ web sites. We...
Nils Madeja, Detlef Schoder
ECIS
2000
13 years 11 months ago
Towards a Grounded Theory of Information Systems for the International Firm: Critical Variables and Causal Networks
-International Information Systems, often of critical importance for the operations of the multinational enterprise, are poorly researches and there is a dearth of theoretical fram...
Hans P. Lehmann
IJNSEC
2008
154views more  IJNSEC 2008»
13 years 9 months ago
ID-based Weak Blind Signature From Bilinear Pairings
In a blind signature scheme, the user can get a signature sig(m) on message m generated from the signer's blind signature sig(m ) on blinded message m , but the signer can�...
Ze-mao Zhao
TSP
2008
114views more  TSP 2008»
13 years 9 months ago
Clipping-Noise Guided Sign-Selection for PAR Reduction in OFDM Systems
The peak-to-average power ratio (PAR) of orthogonal frequency division multiplexing (OFDM) systems can be reduced by using an optimal set of subcarrier signs. However, this sign se...
Luqing Wang, Chintha Tellambura