Sciweavers

694 search results - page 100 / 139
» Security and Usability: Analysis and Evaluation
Sort
View
CCS
2004
ACM
15 years 5 months ago
Web tap: detecting covert web traffic
As network security is a growing concern, system administrators lock down their networks by closing inbound ports and only allowing outbound communication over selected protocols ...
Kevin Borders, Atul Prakash
CTRSA
2010
Springer
172views Cryptology» more  CTRSA 2010»
15 years 6 months ago
Revisiting Higher-Order DPA Attacks:
Security devices are vulnerable to side-channel attacks that perform statistical analysis on data leaked from cryptographic computations. Higher-order (HO) attacks are a powerful a...
Benedikt Gierlichs, Lejla Batina, Bart Preneel, In...
BMCBI
2008
148views more  BMCBI 2008»
14 years 12 months ago
Critical assessment of alignment procedures for LC-MS proteomics and metabolomics measurements
Background: Liquid chromatography coupled to mass spectrometry (LC-MS) has become a prominent tool for the analysis of complex proteomics and metabolomics samples. In many applica...
Eva Lange, Ralf Tautenhahn, Steffen Neumann, Cleme...
MOBISYS
2009
ACM
16 years 10 days ago
xShare: supporting impromptu sharing of mobile phones
Loaded with personal data, e.g. photos, contacts, and call history, mobile phones are truly personal devices. Yet it is often necessary or desirable to share our phones with other...
Yunxin Liu, Ahmad Rahmati, Yuanhe Huang, Hyukjae J...
ETELEMED
2009
IEEE
171views Healthcare» more  ETELEMED 2009»
15 years 6 months ago
Drivers and Challenges of Wireless Solutions in Future Healthcare
What do IT oriented healthcare people think to be most attractive and credible wireless applications in healthcare? What do they think about the challenges? These questions were p...
Esko Alasaarela, Ravi Nemana, Steven DeMello