Sciweavers

3544 search results - page 476 / 709
» Information Security in Open Systems
Sort
View
BMCBI
2006
94views more  BMCBI 2006»
14 years 11 months ago
Fly-DPI: database of protein interactomes for D. melanogaster in the approach of systems biology
Background: Proteins control and mediate many biological activities of cells by interacting with other protein partners. This work presents a statistical model to predict protein ...
Chung-Yen Lin, Shu-Hwa Chen, Chi-Shiang Cho, Chia-...
113
Voted
WWW
2005
ACM
16 years 12 days ago
An abuse-free fair contract signing protocol based on the RSA signature
A fair contract signing protocol allows two potentially mistrusted parities to exchange their commitments (i.e., digital signatures) to an agreed contract over the Internet in a f...
Guilin Wang
CCS
2007
ACM
15 years 6 months ago
Network anomaly detection based on TCM-KNN algorithm
Intrusion detection is a critical component of secure information systems. Network anomaly detection has been an active and difficult research topic in the field of Intrusion Dete...
Yang Li, Binxing Fang, Li Guo, You Chen
TIFS
2010
186views more  TIFS 2010»
14 years 10 months ago
An abuse-free fair contract-signing protocol based on the RSA signature
A fair contract signing protocol allows two potentially mistrusted parities to exchange their commitments (i.e., digital signatures) to an agreed contract over the Internet in a f...
Guilin Wang
ACSAC
2010
IEEE
14 years 9 months ago
Breaking e-banking CAPTCHAs
Many financial institutions have deployed CAPTCHAs to protect their services (e.g., e-banking) from automated attacks. In addition to CAPTCHAs for login, CAPTCHAs are also used to...
Shujun Li, S. Amier Haider Shah, M. Asad Usman Kha...