Abstract. Biometric identification has emerged as a reliable means of controlling access to both physical and virtual spaces. In spite of the rapid proliferation of large-scale dat...
Biometrics-based authentication systems offer enhanced security and user convenience compared to traditional token-based (e.g., ID card) and knowledge-based (e.g., password) system...
Abstract. The goal of a biometric encryption system is to embed a secret into a biometric template in a way that can only be decrypted with a biometric image from the enroled perso...
This paper focuses on agent-based approach to study the relationship between the individual behavior of participants and the overall development of a virtual community, to help pe...
Peer-to-Peer, or P2P sharing has gone through fast growth in recent years and drawn the interests of Information Systems (IS) researchers. However, there is a lack of empirical st...
Abstract— We compare two alternative mechanisms for capping prices in two-settlement electricity markets. With sufficient lead time and competitive entry opportunities, forward ...
Jian Yao, Bert Willems, Shmuel S. Oren, Ilan Adler
Discourse, a form of collaborative learning [44], is one of the most widely used methods of teaching and learning in the online environment. Particularly in large courses, discour...
I. Wong-Bushby, Starr Roxanne Hiltz, Michael Biebe...
The goal of a Public-Key-Infrastructure (PKI) is to prove whether a cryptographic public key is authentic for a certain user. This information is crucial for the reliability of as...
Vertical IS standards prescribe data structures and definitions, document formats, and business processes for particular industries, in contrast to horizontal IT standards, which ...
Rolf T. Wigand, Charles W. Steinfield, M. Lynne Ma...