Sciweavers

5722 search results - page 10 / 1145
» Security Function Interactions
Sort
View
105
Voted
WISTP
2010
Springer
15 years 6 months ago
Secure and Usable Out-Of-Band Channels for Ad Hoc Mobile Device Interactions
Protocols for bootstrapping security in ad hoc mobile device interactions rely on users’ ability to perform specific tasks such as transferring or comparing fingerprints of inf...
Ronald Kainda, Ivan Flechais, A. W. Roscoe
107
Voted
BMCBI
2008
141views more  BMCBI 2008»
14 years 11 months ago
Discovering functional interaction patterns in protein-protein interaction networks
Background: In recent years, a considerable amount of research effort has been directed to the analysis of biological networks with the availability of genome-scale networks of ge...
Mehmet E. Turanalp, Tolga Can
102
Voted
BIOINFORMATICS
2007
161views more  BIOINFORMATICS 2007»
14 years 11 months ago
Functional evaluation of domain-domain interactions and human protein interaction networks
: Large amounts of protein and domain interaction data are being produced by experimental high-throughput techniques and computational approaches. To gain insight into the value of...
Andreas Schlicker, Carola Huthmacher, Fidel Ram&ia...
109
Voted
POLICY
2001
Springer
15 years 4 months ago
IPSec/VPN Security Policy: Correctness, Conflict Detection, and Resolution
IPSec (Internet Security Protocol Suite) functions will be executed correctly only if its policies are correctly specified and configured. Manual IPSec policy configuration is inef...
Zhi Fu, Shyhtsun Felix Wu, He Huang, Kung Loh, Fen...
118
Voted
APSCC
2008
IEEE
15 years 6 months ago
A Service-Oriented Framework for Quantitative Security Analysis of Software Architectures
Software systems today often run in malicious environments in which attacks or intrusions are quite common. This situation has brought security concerns into the development of so...
Yanguo Liu, Issa Traoré, Alexander M. Hoole