Sciweavers

5722 search results - page 36 / 1145
» Security Function Interactions
Sort
View
138
Voted
BMCBI
2007
133views more  BMCBI 2007»
15 years 5 months ago
Semantic integration to identify overlapping functional modules in protein interaction networks
Background: The systematic analysis of protein-protein interactions can enable a better understanding of cellular organization, processes and functions. Functional modules can be ...
Young-Rae Cho, Woochang Hwang, Murali Ramanathan, ...
98
Voted
CHI
2008
ACM
16 years 5 months ago
Human, organizational, and technological factors of IT security
André Gagné, David Botta, Kasia Muld...
CASSIS
2004
Springer
15 years 10 months ago
A Mechanism for Secure, Fine-Grained Dynamic Provisioning of Applications on Small Devices
William R. Bush, Antony Ng, Douglas N. Simon, Bern...
127
Voted
CHI
2011
ACM
14 years 8 months ago
Data type based security alert dialogs
Max-Emanuel Maurer, Alexander De Luca, Heinrich Hu...
119
Voted
IEICET
2008
113views more  IEICET 2008»
15 years 5 months ago
Classification of Hash Functions Suitable for Real-Life Systems
Cryptographic hash functions have been widely studied and are used in many current systems. Though much research has been done on the security of hash functions, system designers ...
Yasumasa Hirai, Takashi Kurokawa, Shin'ichiro Mats...