Sciweavers

255 search results - page 47 / 51
» Principles for Entity Authentication
Sort
View
CHI
2010
ACM
14 years 21 days ago
The true cost of unusable password policies: password use in the wild
HCI research published 10 years ago pointed out that many users cannot cope with the number and complexity of passwords, and resort to insecure workarounds as a consequence. We pr...
Philip Inglesant, Martina Angela Sasse
GD
2008
Springer
13 years 8 months ago
Graph Drawing for Security Visualization
Abstract. As the number of devices connected to the internet continues to grow rapidly and software systems are being increasingly deployed on the web, security and privacy have be...
Roberto Tamassia, Bernardo Palazzi, Charalampos Pa...
BMCBI
2007
117views more  BMCBI 2007»
13 years 7 months ago
DNA-based watermarks using the DNA-Crypt algorithm
Background: The aim of this paper is to demonstrate the application of watermarks based on DNA sequences to identify the unauthorized use of genetically modified organisms (GMOs) ...
Dominik Heider, Angelika Barnekow
GRID
2006
Springer
13 years 7 months ago
Toward an On-Demand Restricted Delegation Mechanism for Grids
Grids are intended to enable cross-organizational interactions which makes Grid security a challenging and nontrivial issue. In Grids, delegation is a key facility that can be used...
Mehran Ahsant, Jim Basney, Olle Mulmo, Adam J. Lee...
BMCBI
2004
98views more  BMCBI 2004»
13 years 7 months ago
Incidence of "quasi-ditags" in catalogs generated by Serial Analysis of Gene Expression (SAGE)
Background: Serial Analysis of Gene Expression (SAGE) is a functional genomic technique that quantitatively analyzes the cellular transcriptome. The analysis of SAGE libraries rel...
Sergey V. Anisimov, Alexei A. Sharov