Sciweavers

4413 search results - page 56 / 883
» Security for biometric data
Sort
View
HICSS
2011
IEEE
386views Biometrics» more  HICSS 2011»
13 years 1 months ago
Cloud Hooks: Security and Privacy Issues in Cloud Computing
In meteorology, the most destructive extratropical cyclones evolve with the formation of a bent-back front and cloud head separated from the main polar-front, creating a hook that...
Wayne A. Jansen
ACNS
2008
Springer
147views Cryptology» more  ACNS 2008»
14 years 4 months ago
Multi-factor Authenticated Key Exchange
Abstract. In order to increase the security for authenticated key exchange protocols, various authentication means can be used together. In this paper, we introduce a security mode...
David Pointcheval, Sébastien Zimmer
HICSS
2007
IEEE
108views Biometrics» more  HICSS 2007»
14 years 4 months ago
Addressing IT Security for Critical Control Systems
— Control systems for critical infrastructures like national power grids make increasingly use of open technologies and protocols, and the Internet. In this environment, the risk...
Martin Naedele
HICSS
2006
IEEE
82views Biometrics» more  HICSS 2006»
14 years 4 months ago
A Preliminary Investigation of the Impact of the Sarbanes-Oxley Act on Information Security
This paper examines the information security implications of the Sarbanes-Oxley (SOX) Act of 2002. It is well-established in the information systems field that managers do not ran...
Janine L. Spears, Robert J. Cole
HICSS
1999
IEEE
155views Biometrics» more  HICSS 1999»
14 years 2 months ago
Agent Communication Languages for Information-Centric Agent Communities
As the complexity and application scope of agent-based systems increases, the requirements placed on Agent Communication Languages have also increased with it. Currently-available...
Marian H. Nodine, Damith Chandrasekara