


default search action
6th ICGS3 2010: Braga, Portugal
- Sérgio Tenreiro de Magalhães
, Hamid Jahankhani, Ali G. Hessami:
Global Security, Safety, and Sustainability - 6th International Conference, ICGS3 2010, Braga, Portugal, September 1-3, 2010. Proceedings. Communications in Computer and Information Science 92, Springer 2010, ISBN 978-3-642-15716-5 - Isabel F. Loureiro
, Celina P. Leão
, Pedro M. Arezes
:
Management of the Benefits on the Client's Involvement on Ergonomic Analysis. 1-8 - Teresa Susana Mendes Pereira
, Henrique M. Dinis Santos
:
A Security Audit Framework to Manage Information System Security. 9-18 - Annette Tolnai, Sebastiaan H. von Solms:
The Cloud's Core Virtual Infrastructure Security. 19-27 - Tapio Saarelainen, Jorma Jormakka:
Collaboration and Command Tools for Crises Management. 28-38 - Filipe Caldeira
, Edmundo Monteiro
, Paulo Simões
:
Trust and Reputation Management for Critical Infrastructure Protection. 39-47 - Michael Morran, George R. S. Weir:
An Approach to Textual Steganography. 48-54 - Ameer Al-Nemrat, Hamid Jahankhani, David S. Preston:
Cybercrime Victimisations/Criminalisation and Punishment. 55-62 - Tiago Martins, Sérgio Tenreiro de Magalhães
:
Baby-Crying Acceptance. 63-70 - Shibin Su, Heng Wang, Hua Zhang, Wei Xiong:
Design of Discrete Variable Structure Controller Based on Variable Boundary Layer. 71-78 - Kenneth Revett, Sérgio Tenreiro de Magalhães
:
Cognitive Biometrics: Challenges for the Future. 79-86 - Abdullah Rashed, Henrique M. Dinis Santos
:
Multimodal Biometrics and Multilayered IDM for Secure Authentication. 87-95 - Bobby L. Tait
:
Secure Biometric Multi-Logon System Based on Current Authentication Technologies. 96-103 - Hossein Jahankhani, Maktuba Mohid:
Analysis of Fingerprint Image to Verify a Person. 104-119 - José Martins, Henrique dos Santos
:
Methods of Organizational Information Security - (A Literature Review). 120-130 - Abdullah Rashed, Henrique M. Dinis Santos
:
OTM Machine Acceptance: In the Arab Culture. 131-138 - Hamid Reza Peikari:
A Study on the Interrelations between the Security-Related Antecedents of Customers' Online Trust. 139-148 - Hamid Reza Peikari:
Does Nationality Matter in the B2C Environment? Results from a Two Nation Study. 149-159 - Hatamirad Ali, Hasan Mehrjerdi:
Deployment of ERP Systems at Automotive Industries, Security Inspection (Case Study: IRAN KHODRO Automotive Company). 160-169 - Ali Sanayei, Reza Shafe'ei:
The Effect of Non-technical Factors in B2C E-Commerce - (A Case Study in Iran). 178-192 - Cristiana Gonilho-Pereira
, Emilija Zdraveva, Raul Fangueiro
, Senentxu Lanceros-Mendez
, Said Jalali
, Mário de Araújo:
Self-monitoring Composite Rods for Sustainable Construction. 193-201 - Ali G. Hessami, Nicos Karcanias:
Systems Assurance, Complexity and Emergence: The Need for a Systems Based Approach. 202-215 - Amin Hosseinian Far
, Elias Pimenidis, Hamid Jahankhani, D. C. Wijeyesekera:
A Review on Sustainability Models. 216-222 - Hamid Reza Peikari:
The Influence of Security Statement, Technical Protection, and Privacy on Satisfaction and Loyalty; A Structural Equation Modeling. 223-231 - Paulo Mourão
:
"Fiscal Illusion Causes Fiscal Delusion - Please Be Careful!". 232-237 - Christos K. Georgiadis
, Ioannis Kokkinidis, Elias Pimenidis:
A Coloured Petri Net Analysis of the Transaction Internet Protocol. 238-249 - Ali Shayan, Behnam Abdi, Malihe Qeisari:
Identification of the Required Security Practices during e-Government Maturity. 250-262 - Abdullahi Arabo, Qi Shi, Madjid Merabti:
Dynamic Device Configuration in Ubiquitous Environments. 263-273 - Abolfazl Falahati
, Mahdi Azarafrooz:
Mitigation of Control Channel Jamming via Combinatorial Key Distribution. 274-281 - Hoda Jannati, Abolfazl Falahati
:
A Proxy Signature Scheme Based on Coding Theory. 282-290 - Saeed Ebadi Tavallaei, Abolfazl Falahati
:
Partially Key Distribution with Public Key Cryptosystem Based on Error Control Codes. 291-299

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.