Background: The identification and characterization of genes that influence the risk of common, complex multifactorial disease primarily through interactions with other genes and ...
Alison A. Motsinger, Stephen L. Lee, George Mellic...
Phishing is a significant problem involving fraudulent email and web sites that trick unsuspecting users into revealing private information. In this paper, we present the design, ...
Jason I. Hong, Lorrie Faith Cranor, Yue Zhang 0002
In this paper, we argue that person-to-person key distribution is best accomplished with a key-centric approach, instead of PKI: users should distribute public key fingerprints in...
In today’s e-commerce environment, information is an incredibly valuable asset. Surveys indicate that companies are suffering staggering financial losses due to web security iss...
Abstract--Sensor network ubiquitous environments may generate a lot of data including heterogeneous `raw' sensor data, low-level feature and/or trend data and higher-level con...
Brian J. d'Auriol, Le Xuan Hung, Sungyoung Lee, Yo...