Sciweavers

8322 search results - page 32 / 1665
» What Are We Looking for
Sort
View
FC
2009
Springer
142views Cryptology» more  FC 2009»
14 years 2 months ago
Passwords: If We're So Smart, Why Are We Still Using Them?
While a lot has changed in Internet security in the last 10 years, a lot has stayed the same – such as the use of alphanumeric passwords. Passwords remain the dominant means of a...
Cormac Herley, Paul C. van Oorschot, Andrew S. Pat...
EGOV
2007
Springer
14 years 1 months ago
A European Perspective of E-Government Presence - Where Do We Stand? The EU-10 Case
It is widely perceived that the nature of ICT is changing and so is the scale of the resulting economic and societal impact around Europe. Continued and accelerating technological ...
Panagiotis Germanakos, Eleni Christodoulou, George...
EGCDMAS
2004
147views ECommerce» more  EGCDMAS 2004»
13 years 9 months ago
Should We Prove Security Policies Correct?
Security policies are abstract descriptions of how a system should behave to be secure. They typically express what is obligatory, permitted, or forbidden in the system. When the s...
Sebastiano Battiato, Giampaolo Bella, Salvatore Ri...
SIGIR
2004
ACM
14 years 29 days ago
Classifying racist texts using a support vector machine
In this poster we present an overview of the techniques we used to develop and evaluate a text categorisation system for the PRINCIP project which sets out to automatically classi...
Edel Greevy, Alan F. Smeaton
SADFE
2010
IEEE
13 years 5 months ago
Fonts for Forensics
: Like other latent evidence that cannot be directly perceived by people, bit sequences have to be presented through tools. Presentations of digital forensic evidence often involve...
Fred Cohen