Sciweavers

4413 search results - page 54 / 883
» Security for biometric data
Sort
View
TRUST
2010
Springer
13 years 8 months ago
Escrowed Data and the Digital Envelope
King Ables, Mark D. Ryan
HICSS
2010
IEEE
487views Biometrics» more  HICSS 2010»
14 years 4 months ago
A Survey of Game Theory as Applied to Network Security
Network security is a complex and challenging problem. The area of network defense mechanism design is receiving immense attention from the research community for more than two de...
Sankardas Roy, Charles Ellis, Sajjan Shiva, Dipank...
HICSS
2009
IEEE
151views Biometrics» more  HICSS 2009»
14 years 4 months ago
Integrating Formal Analysis and Design to Preserve Security Properties
The use of formal methods has long been advocated in the development of secure systems. Yet, methods for deriving design from requirements that guarantee retention of the intended...
Riham Hassan, Shawn A. Bohner, Sherif El-Kassas, M...
HICSS
2006
IEEE
100views Biometrics» more  HICSS 2006»
14 years 4 months ago
e-Government and Cyber Security: The Role of Cyber Security Exercises
e-Government operations are increasing with citizen demand for timely and cost effective services. Security associated with individual systems is similar to many e-commerce soluti...
Art Conklin, Gregory B. White