Sciweavers

4413 search results - page 72 / 883
» Security for biometric data
Sort
View
HICSS
2006
IEEE
160views Biometrics» more  HICSS 2006»
14 years 4 months ago
Cyber Defense Competitions and Information Security Education: An Active Learning Solution for a Capstone Course
The content of information security curricula spans a wide array of topics. Because of this variety, a program needs to focus on some particular aspect and provide appropriate dep...
Art Conklin
HICSS
2003
IEEE
153views Biometrics» more  HICSS 2003»
14 years 3 months ago
Balancing Safety Against Performance: Tradeoffs in Internet Security
All Internet-accessible computing systems are currently faced with incessant threats ranging from simple scriptkiddies to highly sophisticated criminal enterprises. In response to...
Vu A. Ha, David J. Musliner
ACSW
2003
13 years 11 months ago
A Secure Pervasive Environment
This paper explores the complications encountered when attempting to create a secure pervasive computing environment. The model introduced in this paper is primarily conceptual. T...
Patrick G. McLean
TIFS
2008
133views more  TIFS 2008»
13 years 10 months ago
Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding
Abstract-- It has recently been discovered that using pseudorandom sequences as carriers in spread-spectrum techniques for data-hiding is not at all a sufficient condition for ensu...
François Cayre, Patrick Bas
HICSS
2009
IEEE
99views Biometrics» more  HICSS 2009»
14 years 4 months ago
Methodology for Evaluating Security Controls Based on Key Performance Indicators and Stakeholder Mission
Information security continues to evolve in response to disruptive changes with a persistent focus on information-centric controls and a healthy debate about balancing endpoint an...
Frederick T. Sheldon, Robert K. Abercrombie, Ali M...