Sciweavers

5722 search results - page 155 / 1145
» Security Function Interactions
Sort
View
80
Voted
GECCO
2008
Springer
104views Optimization» more  GECCO 2008»
15 years 1 months ago
Protein-protein functional association prediction using genetic programming
Determining if a group of proteins are functionally associated among themselves is an open problem in molecular biology. Within our long term goal of applying Genetic Programming ...
Beatriz García, Ricardo Aler, Agapito Ledez...
95
Voted
CSCW
2002
ACM
15 years 14 days ago
The character, functions, and styles of instant messaging in the workplace
Current perceptions of Instant Messaging (IM) use are based primarily on self-report studies. We logged thousands of (mostly) workplace IM conversations and evaluated their conver...
Ellen Isaacs, Alan Walendowski, Steve Whittaker, D...
79
Voted
CHI
2010
ACM
15 years 7 months ago
Making policy decisions disappear into the user's workflow
: © Making Policy Decisions Disappear into the User's Workflow Alan H. Karp, Marc Stiegler HP Laboratories HPL-2009-341 Usable security Complaints of security interfering wit...
Alan H. Karp, Marc Stiegler
76
Voted
CRYPTO
2005
Springer
94views Cryptology» more  CRYPTO 2005»
15 years 6 months ago
Improved Security Analyses for CBC MACs
We present an improved bound on the advantage of any q-query adversary at distinguishing between the CBC MAC over a random n-bit permutation and a random function outputting n bit...
Mihir Bellare, Krzysztof Pietrzak, Phillip Rogaway
86
Voted
P2P
2003
IEEE
15 years 6 months ago
Secure and Resilient Peer-to-Peer E-Mail: Design and Implementation
E-mail is a mission-critical communication function for virtually all institutions. Modern e-mail employs a servercentric design, in which the user is critically dependent on her ...
Jussi Kangasharju, Keith W. Ross, David A. Turner