Sciweavers

3149 search results - page 87 / 630
» IT security risk management
Sort
View
IDTRUST
2010
ACM
14 years 3 months ago
Biometrics-based identifiers for digital identity management
Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciari...
IDTRUST
2009
ACM
14 years 3 months ago
Privacy-preserving management of transactions' receipts for mobile environments
Federica Paci, Ning Shang, Sam Kerr, Kevin Steuer ...
ACISP
2003
Springer
14 years 21 days ago
Separating Encryption and Key Issuance in Digital Rights Management Systems
Goichiro Hanaoka, Kazuto Ogawa, Itsuro Murota, Go ...
CHI
2008
ACM
14 years 9 months ago
Security practitioners in context: their activities and interactions
This study investigates the context of interactions of IT security practitioners, based on a qualitative analysis of 30 interviews and participatory observation. We identify nine ...
Rodrigo Werlinger, Kirstie Hawkey, Konstantin Bezn...