Sciweavers

4413 search results - page 74 / 883
» Security for biometric data
Sort
View
HICSS
2007
IEEE
117views Biometrics» more  HICSS 2007»
14 years 5 months ago
Offering Mobile Security as a Service
The objective of this paper is to study how a software product company can expand its productbased business with the Software as a Service (SaaS) model into the mobile setting. We...
Aki Lassila
HICSS
2006
IEEE
131views Biometrics» more  HICSS 2006»
14 years 5 months ago
Design and Characterization of a Hardware Encryption Management Unit for Secure Computing Platforms
— Software protection is increasingly necessary for uses in commercial systems, digital content distributors, and military systems. The Secure Software (SecSoft) architecture is ...
Anthony J. Mahar, Peter M. Athanas, Stephen D. Cra...
HICSS
2000
IEEE
109views Biometrics» more  HICSS 2000»
14 years 3 months ago
Scalable and Secure Resource Location
In this paper we present Captain Cook, a service that continuously monitors resources in the Internet, and allows clients to locate resources using this information. Captain Cook ...
Robbert van Renesse
HICSS
2011
IEEE
196views Biometrics» more  HICSS 2011»
13 years 2 months ago
XTRec: Secure Real-Time Execution Trace Recording on Commodity Platforms
We propose XTRec, a primitive that can record the instruction-level execution trace of a commodity computing system. Our primitive is resilient to compromise to provide integrity ...
Amit Vasudevan, Ning Qu, Adrian Perrig
ICIAR
2009
Springer
13 years 9 months ago
Score Level Fusion of Ear and Face Local 3D Features for Fast and Expression-Invariant Human Recognition
Abstract. Increasing risks of spoof attacks and other common problems of unimodal biometric systems such as intra-class variations, nonuniversality and noisy data necessitate the u...
Syed M. S. Islam, Mohammed Bennamoun, Ajmal S. Mia...