Sciweavers

5722 search results - page 209 / 1145
» Security Function Interactions
Sort
View
98
Voted
CTRSA
2006
Springer
160views Cryptology» more  CTRSA 2006»
15 years 4 months ago
RFID-Tags for Anti-counterfeiting
RFID-tags are becoming very popular tools for identification of products. As they have a small microchip on board, they offer functionality that can be used for security purposes. ...
Pim Tuyls, Lejla Batina
58
Voted
AGENTS
2000
Springer
15 years 5 months ago
Put your best face forward: anthropomorphic agents, e-commerce consumers, and the law
Highly believable anthropomorphic agents endanger electronic consumers. Because of concerning tendencies in human-agent interaction arising from agents’ anthropomorphic qualitie...
Carey Heckman, Jacob O. Wobbrock
ISPEC
2010
Springer
15 years 2 months ago
An Efficient Convertible Undeniable Signature Scheme with Delegatable Verification
Abstract. Undeniable signatures, introduced by Chaum and van Antwerpen, require a verifier to interact with the signer to verify a signature, and hence allow the signer to control ...
Jacob C. N. Schuldt, Kanta Matsuura
BMCBI
2007
140views more  BMCBI 2007»
15 years 28 days ago
From genes to functional classes in the study of biological systems
Background: With the popularisation of high-throughput techniques, the need for procedures that help in the biological interpretation of results has increased enormously. Recently...
Fátima Al-Shahrour, Leonardo Arbiza, Hern&a...
119
Voted
BMCBI
2007
118views more  BMCBI 2007»
15 years 28 days ago
A new advance in alternative splicing databases: from catalogue to detailed analysis of regulation of expression and function of
Background: Most human genes produce several transcripts with different exon contents by using alternative promoters, alternative polyadenylation sites and alternative splice site...
Pierre de la Grange, Martin Dutertre, Margot Corre...