Sciweavers

5722 search results - page 464 / 1145
» Security Function Interactions
Sort
View
MOBISYS
2009
ACM
16 years 5 months ago
SPATE: small-group PKI-less authenticated trust establishment
Establishing trust between a group of individuals remains a difficult problem. Prior works assume trusted infrastructure, require an individual to trust unknown entities, or provi...
Yue-Hsun Lin, Ahren Studer, Hsu-Chun Hsiao, Jonath...
CHI
2010
ACM
15 years 10 months ago
The true cost of unusable password policies: password use in the wild
HCI research published 10 years ago pointed out that many users cannot cope with the number and complexity of passwords, and resort to insecure workarounds as a consequence. We pr...
Philip Inglesant, Martina Angela Sasse
ACSAC
2010
IEEE
15 years 2 months ago
FIRM: capability-based inline mediation of Flash behaviors
The wide use of Flash technologies makes the security risks posed by Flash content an increasingly serious issue. Such risks cannot be effectively addressed by the Flash player, w...
Zhou Li, XiaoFeng Wang
MOBISYS
2011
ACM
14 years 7 months ago
Analyzing inter-application communication in Android
Modern smartphone operating systems support the development of third-party applications with open system APIs. In addition to an open API, the Android operating system also provid...
Erika Chin, Adrienne Porter Felt, Kate Greenwood, ...
BMCBI
2006
94views more  BMCBI 2006»
15 years 4 months ago
Fly-DPI: database of protein interactomes for D. melanogaster in the approach of systems biology
Background: Proteins control and mediate many biological activities of cells by interacting with other protein partners. This work presents a statistical model to predict protein ...
Chung-Yen Lin, Shu-Hwa Chen, Chi-Shiang Cho, Chia-...