Sciweavers

4413 search results - page 40 / 883
» Security for biometric data
Sort
View
AVSS
2006
IEEE
14 years 4 months ago
On Person Authentication by Fusing Visual and Thermal Face Biometrics
Recognition algorithms that use data obtained by imaging faces in the thermal spectrum are promising in achieving invariance to extreme illumination changes that are often present...
Ognjen Arandjelovic, Riad I. Hammoud, Roberto Cipo...
HICSS
2003
IEEE
176views Biometrics» more  HICSS 2003»
14 years 3 months ago
Ad-Hoc Association-Rule Mining within the Data Warehouse
Many organizations often underutilize their already constructed data warehouses. In this paper, we suggest a novel way of acquiring more information from corporate data warehouses...
Svetlozar Nestorov, Nenad Jukic
HICSS
2008
IEEE
120views Biometrics» more  HICSS 2008»
14 years 4 months ago
Exploring the Suitability of IS Security Management Standards for SMEs
In this paper we examine the adequacy of IS security standards to the needs of SMEs. Using the findings of literature review, we identify general criticism for the security standa...
Yves Barlette, Vladislav Fomin
HICSS
2010
IEEE
139views Biometrics» more  HICSS 2010»
13 years 7 months ago
Quality and Fairness of an Information Security Policy As Antecedents of Employees' Security Engagement in the Workplace: An Emp
This paper investigates the impact of the characteristics of information security policy (ISP) on an employee's security compliance in the workplace. Two factors were propose...
Burcu Bulgurcu, Hasan Cavusoglu, Izak Benbasat
CCS
2008
ACM
13 years 12 months ago
Cognitive security for personal devices
Humans should be able to think of computers as extensions of their body, as craftsmen do with their tools. Current security models, however, are too unlike those used in human min...
Rachel Greenstadt, Jacob Beal