Sciweavers

433 search results - page 75 / 87
» Administrative and Public Verifiability: Can We Have Both
Sort
View
SCN
2010
Springer
232views Communications» more  SCN 2010»
13 years 5 months ago
Authenticated Key Agreement with Key Re-use in the Short Authenticated Strings Model
Serge Vaudenay [20] introduced a notion of Message Authentication (MA) protocols in the Short Authenticated String (SAS) model. A SAS-MA protocol authenticates arbitrarily long mes...
Stanislaw Jarecki, Nitesh Saxena
ARESEC
2011
117views more  ARESEC 2011»
12 years 7 months ago
Non-Parallelizable and Non-Interactive Client Puzzles from Modular Square Roots
—Denial of Service (DoS) attacks aiming to exhaust the resources of a server by overwhelming it with bogus requests have become a serious threat. Especially protocols that rely o...
Yves Igor Jerschow, Martin Mauve
IJON
2007
82views more  IJON 2007»
13 years 7 months ago
Inhibitory conductance dynamics in cortical neurons during activated states
During activated states in vivo, neocortical neurons are subject to intense synaptic activity and high-amplitude membrane potential ðVmÞ fluctuations. These ‘‘high-conducta...
Martin Pospischil, Zuzanna Piwkowska, Michelle Rud...
IJRR
2006
126views more  IJRR 2006»
13 years 7 months ago
Market-based Multirobot Coordination for Complex Tasks
Current technological developments and application-driven demands are bringing us closer to the realization of autonomous multirobot systems performing increasingly complex missio...
Robert Zlot, Anthony Stentz
BMCBI
2011
13 years 2 months ago
Meta-analysis of gene expression microarrays with missing replicates
Background: Many different microarray experiments are publicly available today. It is natural to ask whether different experiments for the same phenotypic conditions can be combin...
Fan Shi, Gad Abraham, Christopher Leckie, Izhak Ha...