Sciweavers

1356 search results - page 129 / 272
» Analysis of security data from a large computing organizatio...
Sort
View
BMCBI
2010
129views more  BMCBI 2010»
13 years 8 months ago
Geoseq: a tool for dissecting deep-sequencing datasets
Background: Datasets generated on deep-sequencing platforms have been deposited in various public repositories such as the Gene Expression Omnibus (GEO), Sequence Read Archive (SR...
James Gurtowski, Anthony Cancio, Hardik Shah, Chay...
WISEC
2010
ACM
13 years 8 months ago
Attacks on physical-layer identification
Physical-layer identification of wireless devices, commonly referred to as Radio Frequency (RF) fingerprinting, is the process of identifying a device based on transmission imperf...
Boris Danev, Heinrich Luecken, Srdjan Capkun, Kari...
IADIS
2004
13 years 9 months ago
Dimensions of Facilitators for Non-Business E-Commerce Adoption
Non-business EC is a relatively new research niche in the general e-commerce stream. It denotes the use of e-commerce by non-business institutions such as academic institutions (a...
Nelson Oly Ndubisi, M. A. Masmurniwati
ACSAC
2007
IEEE
14 years 2 months ago
SSARES: Secure Searchable Automated Remote Email Storage
The increasing centralization of networked services places user data at considerable risk. For example, many users store email on remote servers rather than on their local disk. D...
Adam J. Aviv, Michael E. Locasto, Shaya Potter, An...
CARDIS
2008
Springer
153views Hardware» more  CARDIS 2008»
13 years 10 months ago
Ultra-Lightweight Implementations for Smart Devices - Security for 1000 Gate Equivalents
In recent years more and more security sensitive applications use passive smart devices such as contactless smart cards and RFID tags. Cost constraints imply a small hardware footp...
Carsten Rolfes, Axel Poschmann, Gregor Leander, Ch...