Sciweavers

631 search results - page 40 / 127
» Strong Authentication and Strong Integrity (SASI) Is Not Tha...
Sort
View
GI
2008
Springer
15 years 2 months ago
Utilization of Semantic Annotations in Interactive User Interfaces for Large Documents
Abstract: With new techniques, such as Microformats or RDFa, for integrating semantics into existing web formats, we expect a strong increase of semantically annotated documents in...
Mark Giereth, Michael Wörner, Harald Bosch, P...
NAR
2011
257views Computer Vision» more  NAR 2011»
14 years 4 months ago
The STRING database in 2011: functional interaction networks of proteins, globally integrated and scored
An essential prerequisite for any systems-level understanding of cellular functions is to correctly uncover and annotate all functional interactions among proteins in the cell. To...
Damian Szklarczyk, Andrea Franceschini, Michael Ku...
124
Voted
ICC
2009
IEEE
174views Communications» more  ICC 2009»
15 years 8 months ago
Biometric Mobile Template Protection: A Composite Feature Based Fingerprint Fuzzy Vault
—Biometric authentication is emerging as the promising solution to conventional cryptography based authentication technologies. However, protecting users’ biometric templates s...
Kai Xi, Jiankun Hu
SOUPS
2009
ACM
15 years 8 months ago
Graphical passwords as browser extension: implementation and usability study
Abstract: Today, most Internet applications still establish user authentication with traditional text based passwords. Designing a secure as well as a user-friendly password-based ...
Kemal Bicakci, Mustafa Yuceel, Burak Erdeniz, Haka...
SACMAT
2004
ACM
15 years 7 months ago
Role-based cascaded delegation
We propose role-based cascaded delegation, a model for delegation of authority in decentralized trust management systems. We show that role-based cascaded delegation combines the ...
Roberto Tamassia, Danfeng Yao, William H. Winsboro...