Sciweavers

107 search results - page 14 / 22
» Vulnerabilities in Biometric Encryption Systems
Sort
View
HICSS
2007
IEEE
112views Biometrics» more  HICSS 2007»
14 years 4 months ago
E-Risk Management through Self Insurance: An Option Model
e-business organizations are under constant threat of their business being disrupted by hackers, viruses and a host of malicious attackers. This would lead to loses to the tune of...
Arunabha Mukhopadhyay, Binay Bhushan, Debashis Sah...
IPPS
2007
IEEE
14 years 4 months ago
Transaction Based Authentication Scheme for Mobile Communication: A Cognitive Agent Based Approach
The vulnerable air interface, device level constraints, and insecure encryption techniques of wireless networks have naturally increased the chance of attacker obtaining users inf...
B. Sathish Babu, Pallapa Venkataram
HICSS
2009
IEEE
95views Biometrics» more  HICSS 2009»
14 years 4 months ago
Intrusion Monitoring in Process Control Systems
To protect process control networks from cyber intrusions, preventive security measures such as perimeter defenses (for example, network firewalls and demilitarized zones) and se...
Alfonso Valdes, Steven Cheung
HICSS
2003
IEEE
103views Biometrics» more  HICSS 2003»
14 years 3 months ago
Toward More Robust Infrastructure: Observations on Improving the Resilience and Reliability of Critical Systems
Civil infrastructure provides the range of essential services generally necessary to support a nation’s economy and quality of life—arguably entire economies rely on the abili...
Richard G. Little
COLCOM
2008
IEEE
14 years 4 months ago
Defending against Attribute-Correlation Attacks in Privacy-Aware Information Brokering
Nowadays, increasing needs for information sharing arise due to extensive collaborations among organizations. Organizations desire to provide data access to their collaborators whi...
Fengjun Li, Bo Luo, Peng Liu, Anna Cinzia Squiccia...