-
1
-
-
1242340857
-
-
Posted at ABA site
-
American Bar Association, Digital Signature Guidelines Tutorial, Posted at ABA site: http://www.abanet.org/scitech/ec/isc/dsg-tutorial.html, 2001.
-
(2001)
Digital Signature Guidelines Tutorial
-
-
-
2
-
-
0031233424
-
Speaker recognition: A tutorial
-
J.P. Campbell Jr., Speaker recognition: a tutorial, Proceedings of the IEEE 85 (9) (1997) 1437-1463.
-
(1997)
Proceedings of the IEEE
, vol.85
, Issue.9
, pp. 1437-1463
-
-
Campbell Jr., J.P.1
-
3
-
-
0027700869
-
High confidence visual recognition of persons by a test of statistical independence
-
Daugman J.G. High confidence visual recognition of persons by a test of statistical independence. IEEE Transactions on Pattern Analysis and Machine Intelligence. 15(11):1993;1148-1161.
-
(1993)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.15
, Issue.11
, pp. 1148-1161
-
-
Daugman, J.G.1
-
4
-
-
1242273268
-
Security issues for systems used for collecting, storing and interpreting human biological data
-
Harrison D. Security issues for systems used for collecting, storing and interpreting human biological data. Journal of Commercial Biotechnology. 8(4):2002;304-314.
-
(2002)
Journal of Commercial Biotechnology
, vol.8
, Issue.4
, pp. 304-314
-
-
Harrison, D.1
-
6
-
-
0031233235
-
An identity-authentication system using fingerprints
-
A.K. Jain, L. Hong, S. Pankanti, R. Bolle, An identity-authentication system using fingerprints, Proceedings of the IEEE 85 (9) (1997) 1365-1388.
-
(1997)
Proceedings of the IEEE
, vol.85
, Issue.9
, pp. 1365-1388
-
-
Jain, A.K.1
Hong, L.2
Pankanti, S.3
Bolle, R.4
-
8
-
-
0035479209
-
Security threats to Internet: A Korean multi-industry investigation
-
Jung B., Han I., Lee S. Security threats to Internet: a Korean multi-industry investigation. Information and Management. 38(8):2001;487-498.
-
(2001)
Information and Management
, vol.38
, Issue.8
, pp. 487-498
-
-
Jung, B.1
Han, I.2
Lee, S.3
-
10
-
-
84935529500
-
Information technology for negotiating groups: Generating options for mutual gain
-
Nunamaker J.F. Jr., Dennis A.R., Valacich J.S., Vogel D.R. Information technology for negotiating groups: generating options for mutual gain. Management Science. 37(10):1991;1325-1346.
-
(1991)
Management Science
, vol.37
, Issue.10
, pp. 1325-1346
-
-
Nunamaker Jr., J.F.1
Dennis, A.R.2
Valacich, J.S.3
Vogel, D.R.4
-
11
-
-
0031140709
-
Internet security: Firewalls and beyond
-
Oppliger R. Internet security: firewalls and beyond. Communications of the ACM. 40(5):1997;92-102.
-
(1997)
Communications of the ACM
, vol.40
, Issue.5
, pp. 92-102
-
-
Oppliger, R.1
-
12
-
-
0031195384
-
Using computers to realize joint gains in negotiations: Toward an electronic bargaining table
-
Rangaswamy A., Shell G.R. Using computers to realize joint gains in negotiations: toward an electronic bargaining table. Management Science. 43(8):1997;1147-1163.
-
(1997)
Management Science
, vol.43
, Issue.8
, pp. 1147-1163
-
-
Rangaswamy, A.1
Shell, G.R.2
-
13
-
-
0031095932
-
Evaluating security threats in mainframe and client/server environments
-
Ryan S.D., Bordoloi B. Evaluating security threats in mainframe and client/server environments. Information and Management. 32(3):1997;137-146.
-
(1997)
Information and Management
, vol.32
, Issue.3
, pp. 137-146
-
-
Ryan, S.D.1
Bordoloi, B.2
-
14
-
-
0036616829
-
Use of electronic signatures: Past and present
-
Sausser G.D. Use of electronic signatures: past and present. Healthcare Financial Management. 56(6):2002;72-73.
-
(2002)
Healthcare Financial Management
, vol.56
, Issue.6
, pp. 72-73
-
-
Sausser, G.D.1
-
15
-
-
0003851399
-
-
Wiley, New York
-
B. Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C, second ed., Wiley, New York, 1996.
-
(1996)
Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Ed.
-
-
Schneier, B.1
-
16
-
-
0002367759
-
Electronic document management: Challenges and opportunities for information systems managers
-
Sprague R.H. Electronic document management: challenges and opportunities for information systems managers. MIS Quarterly. 19(1):1995;29-49.
-
(1995)
MIS Quarterly
, vol.19
, Issue.1
, pp. 29-49
-
-
Sprague, R.H.1
-
17
-
-
0031236835
-
Iris recognition: An emerging biometric technology
-
R.P. Wildes, Iris recognition: an emerging biometric technology, Proceedings of the IEEE 85 (9) (1997) 1348-1364.
-
(1997)
Proceedings of the IEEE
, vol.85
, Issue.9
, pp. 1348-1364
-
-
Wildes, R.P.1
-
18
-
-
0031234213
-
Face recognition: Eigenface, elastic matching, and neural nets
-
J. Zhang, Y. Yan, M. Lades, Face recognition: eigenface, elastic matching, and neural nets, Proceedings of the IEEE 85 (9) (1997) 1423-1436.
-
(1997)
Proceedings of the IEEE
, vol.85
, Issue.9
, pp. 1423-1436
-
-
Zhang, J.1
Yan, Y.2
Lades, M.3
|