Sciweavers

53 search results - page 5 / 11
» Seeing is Believing
Sort
View
HICSS
2002
IEEE
91views Biometrics» more  HICSS 2002»
14 years 12 days ago
Electronic Marketplaces in Hong Kong's Trading Industry
Electronic marketplaces are important because of their potential to change industry structure, for example, by eliminating or altering the role of traditional intermediaries, lead...
M. Lynne Markus, Probir Banerjee, Louis C. K. Ma
SACMAT
2010
ACM
14 years 8 days ago
A card requirements language enabling privacy-preserving access control
We address the problem of privacy-preserving access control in distributed systems. Users commonly reveal more personal data than strictly necessary to be granted access to online...
Jan Camenisch, Sebastian Mödersheim, Gregory ...
CSFW
1998
IEEE
13 years 11 months ago
Proving Security Protocols with Model Checkers by Data Independence Techniques
Model checkers such as FDR have been extremely e ective in checking for, and nding, attacks on cryptographic protocols { see, for example 11, 12, 14] and many of the papers in 3]....
A. W. Roscoe
IFIP
1999
Springer
13 years 11 months ago
Assessing Instructional Technology
: In a relatively short period of time, educational technology has become a basic component of the instructional life of almost every College or University around the world. The wa...
Lawrence M. Baldwin, Panagiotis Takis Metaxas, Win...
LISA
2007
13 years 9 months ago
NetADHICT: A Tool for Understanding Network Traffic
Computer and network administrators are often confused or uncertain about the behavior of their networks. Traditional analysis using IP ports, addresses, and protocols are insuffi...
Hajime Inoue, Dana Jansens, Abdulrahman Hijazi, An...