Sciweavers

5722 search results - page 85 / 1145
» Security Function Interactions
Sort
View
BMCBI
2010
132views more  BMCBI 2010»
13 years 9 months ago
An interaction-motif-based scoring function for protein-ligand docking
Background: A good scoring function is essential for molecular docking computations. In conventional scoring functions, energy terms modeling pairwise interactions are cumulativel...
Zhong-Ru Xie, Ming-Jing Hwang
GRAPHITE
2004
ACM
14 years 2 months ago
Object, function, action for tangible interface design
It is now possible to turn almost any object into an interface. What one must do, however is to explore the user’s needs and perceptions in order to create the metaphors necessa...
Marissa Díaz, Isaac Rudomín
CHIMIT
2007
ACM
14 years 24 days ago
Looking for trouble: understanding end-user security management
End users are often cast as the weak link in computer security; they fall victim to social engineering and tend to know very little about security technology and policies. This pa...
Joshua B. Gross, Mary Beth Rosson
ASIACRYPT
1992
Springer
14 years 27 days ago
On the Power of Memory in the Design of Collision Resistant Hash Functions
Collision resistant hash functions are an important basic tool for cryptographic applications such as digital signature schemes and integrity protection based on "fingerprinti...
Bart Preneel, René Govaerts, Joos Vandewall...
FSE
2008
Springer
111views Cryptology» more  FSE 2008»
13 years 10 months ago
The Hash Function Family LAKE
The aim of this paper is to advocate a new software-oriented hash function family based on the HAIFA framework of Biham and Dunkelman, inheriting built-in randomized hashing and hi...
Jean-Philippe Aumasson, Willi Meier, Raphael C.-W....