A long-term trial of alternative user authentication technologies (English)
- New search for: Furnell, S.M.
- New search for: Furnell, S.M.
- New search for: Papadopoulos, I.
- New search for: Dowland, P.
In:
Information management & computer security
;
12
, 2-3
; 178-190
;
2004
-
ISSN:
- Article (Journal) / Print
-
Title:A long-term trial of alternative user authentication technologies
-
Contributors:
-
Published in:Information management & computer security ; 12, 2-3 ; 178-190
-
Publisher:
- New search for: Emerald Group Publ.
-
Place of publication:Bingley
-
Publication date:2004
-
ISSN:
-
ZDBID:
-
Type of media:Article (Journal)
-
Type of material:Print
-
Language:English
- New search for: 06.35 / 54.38
- Further information on Basic classification
- New search for: 275/1970/3155
-
Classification:
BKL: 06.35 Informationsmanagement / 54.38 Computersicherheit Local classification TIB: 275/1970/3155 -
Source:
Table of contents – Volume 12, Issue 2-3
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 146
-
How well are corporate ethics codes and policies applied in the trenches?: Key factors and conditionsEmbse, Thomas J.von der et al. | 2004
- 154
-
Cyberterrorism, computer crime, and realityFoltz, C.Bryan et al. | 2004
- 167
-
Nature of e-business ethical dilemmasPetrovic-Lazarevic, Sonja et al. | 2004
- 178
-
A long-term trial of alternative user authentication technologiesFurnell, S.M. et al. | 2004
- 191
-
Human resources for information management operations in Kuwaiti corporate companiesRehman, Sajjad ur et al. | 2004
- 206
-
Incorporating WS-Security into a Web services-based portalLim, Billy B.L. et al. | 2004
- 218
-
RECOT: an expert system for the reduction of environmental cost in the textile industryMetaxiotis, Kostas et al. | 2004
- 228
-
Exploring the failure and success of DotComsRazi, Muhammad A. et al. | 2004
- 245
-
An exploration of wireless computing risks: Development of a risk taxonomyBahli, Bouchaib et al. | 2004
- 255
-
Enhancing Web privacy and anonymity in the digital eraGritzalis, Stefanos et al. | 2004
- 288
-
Genetic algorithms: A business perspectiveGrupe, Fritz H. et al. | 2004