Sciweavers

117 search results - page 18 / 24
» A Comparison of Cryptography Courses
Sort
View
JOC
2011
104views more  JOC 2011»
12 years 10 months ago
On the Security of Oscillator-Based Random Number Generators
Physical random number generators (a.k.a. TRNGs) appear to be critical components of many cryptographic systems. Yet, such building blocks are still too seldom provided with a form...
Mathieu Baudet, David Lubicz, Julien Micolod, Andr...
TCC
2004
Springer
164views Cryptology» more  TCC 2004»
14 years 23 days ago
Hierarchical Threshold Secret Sharing
We consider the problem of threshold secret sharing in groups with hierarchical structure. In such settings, the secret is shared among a group of participants that is partitioned ...
Tamir Tassa
GCB
2009
Springer
154views Biometrics» more  GCB 2009»
13 years 11 months ago
Comparative Identification of Differential Interactions from Trajectories of Dynamic Biological Networks
Abstract: It is often challenging to reconstruct accurately a complete dynamic biological network due to the scarcity of data collected in cost-effective experiments. This paper ad...
Zhengyu Ouyang, Mingzhou Song
ESWS
2007
Springer
14 years 1 months ago
Real-World Reasoning with OWL
Abstract. This work is motivated by experiences in the course of developing an ontology-based application within a real-world setting. We found out that current benchmarks are not ...
Timo Weithöner, Thorsten Liebig, Marko Luther...
ISBI
2008
IEEE
14 years 8 months ago
Blind deconvolution for diffraction-limited fluorescence microscopy
Optical Sections of biological samples obtained from a fluorescence Confocal Laser Scanning Microscopes (CLSM) are often degraded by out-of-focus blur and photon counting noise. S...
Praveen Pankajakshan, Bo Zhang, Laure Blanc-F&eacu...