Sciweavers

5722 search results - page 209 / 1145
» Security Function Interactions
Sort
View
CTRSA
2006
Springer
160views Cryptology» more  CTRSA 2006»
15 years 6 months ago
RFID-Tags for Anti-counterfeiting
RFID-tags are becoming very popular tools for identification of products. As they have a small microchip on board, they offer functionality that can be used for security purposes. ...
Pim Tuyls, Lejla Batina
68
Voted
AGENTS
2000
Springer
15 years 7 months ago
Put your best face forward: anthropomorphic agents, e-commerce consumers, and the law
Highly believable anthropomorphic agents endanger electronic consumers. Because of concerning tendencies in human-agent interaction arising from agents’ anthropomorphic qualitie...
Carey Heckman, Jacob O. Wobbrock
ISPEC
2010
Springer
15 years 4 months ago
An Efficient Convertible Undeniable Signature Scheme with Delegatable Verification
Abstract. Undeniable signatures, introduced by Chaum and van Antwerpen, require a verifier to interact with the signer to verify a signature, and hence allow the signer to control ...
Jacob C. N. Schuldt, Kanta Matsuura
111
Voted
BMCBI
2007
140views more  BMCBI 2007»
15 years 2 months ago
From genes to functional classes in the study of biological systems
Background: With the popularisation of high-throughput techniques, the need for procedures that help in the biological interpretation of results has increased enormously. Recently...
Fátima Al-Shahrour, Leonardo Arbiza, Hern&a...
136
Voted
BMCBI
2007
118views more  BMCBI 2007»
15 years 2 months ago
A new advance in alternative splicing databases: from catalogue to detailed analysis of regulation of expression and function of
Background: Most human genes produce several transcripts with different exon contents by using alternative promoters, alternative polyadenylation sites and alternative splice site...
Pierre de la Grange, Martin Dutertre, Margot Corre...