Sciweavers

6844 search results - page 1101 / 1369
» Web Service Security
Sort
View
GRID
2006
Springer
15 years 4 months ago
Providing Portlet-Based Client Access to CIMA-Enabled Crystallographic Instruments, Sensors, and Data
The Common Instrument Middleware Architecture (CIMA) project, supported by the NSF Middleware Initiative, aims at making scientific instruments and sensors remotely accessible by ...
Hao Yin, Donald F. McMullen, Mehmet A. Nacar, Marl...
171
Voted
NAR
2010
148views more  NAR 2010»
14 years 11 months ago
SIMAP - a comprehensive database of pre-calculated protein sequence similarities, domains, annotations and clusters
The prediction of protein function as well as the reconstruction of evolutionary genesis employing sequence comparison at large is still the most powerful tool in sequence analysi...
Thomas Rattei, Patrick Tischler, Stefan Götz,...
156
Voted
CCS
2009
ACM
16 years 5 months ago
On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers
The man-in-the-middle (MITM) attack has been shown to be one of the most serious threats to the security and trust of existing VoIP protocols and systems. For example, the MITM wh...
Ruishan Zhang, Xinyuan Wang, Ryan Farley, Xiaohui ...
136
Voted
CCS
2009
ACM
15 years 11 months ago
Scalable onion routing with torsk
We introduce Torsk, a structured peer-to-peer low-latency anonymity protocol. Torsk is designed as an interoperable replacement for the relay selection and directory service of th...
Jon McLachlan, Andrew Tran, Nicholas Hopper, Yongd...
CCS
2007
ACM
15 years 10 months ago
Pors: proofs of retrievability for large files
In this paper, we define and explore proofs of retrievability (PORs). A POR scheme enables an archive or back-up service (prover) to produce a concise proof that a user (verifier...
Ari Juels, Burton S. Kaliski Jr.
« Prev « First page 1101 / 1369 Last » Next »