Sciweavers

199 search results - page 40 / 40
» Developing an Immunity to Spam
Sort
View
WISEC
2010
ACM
13 years 3 months ago
Preventing multi-query attack in location-based services
Despite increasing popularity, Location-based Services (LBS) (e.g., searching nearby points-of-interest on map) on mobile handheld devices have been subject to major privacy conce...
Nilothpal Talukder, Sheikh Iqbal Ahamed
BMCBI
2011
12 years 8 months ago
Combinatorial analysis and algorithms for quasispecies reconstruction using next-generation sequencing
Background: Next-generation sequencing (NGS) offers a unique opportunity for high-throughput genomics and has potential to replace Sanger sequencing in many fields, including de-n...
Mattia C. F. Prosperi, Luciano Prosperi, Alessandr...
IACR
2011
207views more  IACR 2011»
12 years 4 months ago
Cryptanalysis and Security Enhancement of an Advanced Authentication Scheme using Smart Cards, and a Key Agreement Scheme for Tw
Abstract—In this work we consider two protocols for performing cryptanalysis and security enhancement. The first one by Song, is a password authentication scheme based on smart ...
Swapnoneel Roy, Amlan K. Das, Yu Li
BMCBI
2006
89views more  BMCBI 2006»
13 years 5 months ago
SPODOBASE : an EST database for the lepidopteran crop pest Spodoptera
Background: The Lepidoptera Spodoptera frugiperda is a pest which causes widespread economic damage on a variety of crop plants. It is also well known through its famous Sf9 cell ...
Vincent Nègre, Thierry Hotelier, Anne-Natha...