Sciweavers

5722 search results - page 158 / 1145
» Security Function Interactions
Sort
View
122
Voted
NAR
2011
191views Computer Vision» more  NAR 2011»
14 years 3 months ago
ConsensusPathDB: toward a more complete picture of cell biology
ConsensusPathDB is a meta-database that integrates different types of functional interactions from heterogeneous interaction data resources. Physical protein interactions, metabol...
Atanas Kamburov, Konstantin Pentchev, Hanna Galick...
112
Voted
CISC
2007
Springer
111views Cryptology» more  CISC 2007»
15 years 6 months ago
Multivariates Polynomials for Hashing
We propose the idea of building a secure hash using quadratic or higher degree multivariate polynomials over a finite field as the compression function. We analyze some security ...
Jintai Ding, Bo-Yin Yang
INDOCRYPT
2007
Springer
15 years 6 months ago
Linearization Attacks Against Syndrome Based Hashes
Abstract. In MyCrypt 2005, Augot, Finiasz, and Sendrier proposed FSB, a family of cryptographic hash functions. The security claim of the FSB hashes is based on a coding theory pro...
Markku-Juhani Olavi Saarinen
EUROPKI
2004
Springer
15 years 6 months ago
Filling the Gap between Requirements Engineering and Public Key/Trust Management Infrastructures
The last years have seen a major interest in designing and deploying trust management and public key infrastructures. Yet, it is still far from clear how one can pass from the orga...
Paolo Giorgini, Fabio Massacci, John Mylopoulos, N...
100
Voted
SIGDOC
1998
ACM
15 years 4 months ago
Applying the Act-Function-Phase Model to Aviation Documentation
The act-function-phase model systematically relates the acts of the dialogue at time-of-use to the acts of the dialogue between author and users at time-of-development. We show ho...
David G. Novick, Saïd Tazi