Sciweavers

5722 search results - page 1065 / 1145
» Security Function Interactions
Sort
View
118
Voted
CRYPTO
2010
Springer
171views Cryptology» more  CRYPTO 2010»
15 years 3 months ago
Credential Authenticated Identification and Key Exchange
Secure two-party authentication and key exchange are fundamental problems. Traditionally, the parties authenticate each other by means of their identities, using a public-key infr...
Jan Camenisch, Nathalie Casati, Thomas Groß,...
MOBICOM
2010
ACM
15 years 2 months ago
Privacy vulnerability of published anonymous mobility traces
Mobility traces of people and vehicles have been collected and published to assist the design and evaluation of mobile networks, such as large-scale urban sensing networks. Althou...
Chris Y. T. Ma, David K. Y. Yau, Nung Kwan Yip, Na...
127
Voted
BIOINFORMATICS
2007
102views more  BIOINFORMATICS 2007»
15 years 2 months ago
OmicBrowse: a browser of multidimensional omics annotations
OmicBrowse is a browser to explore multiple datasets coordinated in the multidimensional omic space integrating omics knowledge ranging from genomes to phenomes and connecting evo...
Tetsuro Toyoda, Yoshiki Mochizuki, Keith Player, N...
124
Voted
ARTMED
2006
86views more  ARTMED 2006»
15 years 2 months ago
Spatiotemporal reasoning about epidemiological data
Objective. In this article, we propose new methods to visualize and reason about spatiotemporal epidemiological data. Background. Efficient computerized reasoning about epidemics ...
Peter Z. Revesz, Shasha Wu
114
Voted
COMCOM
2006
121views more  COMCOM 2006»
15 years 2 months ago
Load-balanced agent activation for value-added network services
In relation to its growth in size and user population, the Internet faces new challenges that have triggered the proposals of value-added network services, e.g., IP multicast, IP ...
Chao Gong, Kamil Saraç, Ovidiu Daescu, Bala...
« Prev « First page 1065 / 1145 Last » Next »