Sciweavers

4413 search results - page 70 / 883
» Security for biometric data
Sort
View
HICSS
2005
IEEE
134views Biometrics» more  HICSS 2005»
14 years 3 months ago
Discussion of a Large-Scale Open Source Data Collection Methodology
This paper discusses in detail a possible methodology for collecting repository data on a large number of open source software projects from a single project hosting and community...
Michael Hahsler, Stefan Koch
GI
2003
Springer
14 years 3 months ago
Two-Factor Web Authentication Via Voice
: The increasing pressure for network accessible information and business applications demands secure, interoperable, cost efficient and user self-service authentication procedures...
Jörg Tacke, Andreas Wolf
ACSAC
2003
IEEE
14 years 3 months ago
Protecting Personal Data: Can IT Security Management Standards Help?
Compelled to improve information security by the introduction of personal data protection legislation, organizations worldwide are adopting standardized security management guidel...
Giovanni Iachello
CCS
2010
ACM
14 years 4 months ago
Secure provenance: the essential of bread and butter of data forensics in cloud computing
Secure provenance that records ownership and process history of data objects is vital to the success of data forensics in cloud computing, yet it is still a challenging issue toda...
Rongxing Lu, Xiaodong Lin, Xiaohui Liang, Xuemin (...
HICSS
2008
IEEE
88views Biometrics» more  HICSS 2008»
14 years 4 months ago
The Deterrent and Displacement Effects of Information Security Enforcement: International Evidence
Abstract: We adapt the event study methodology from research in financial economics to study the impact of government enforcement and economic opportunities on information security...
Ivan P. L. Png, Chen-Yu Wang, Qiu-Hong Wang