Sciweavers

2715 search results - page 43 / 543
» Database Publication Practices
Sort
View
FC
2010
Springer
205views Cryptology» more  FC 2010»
13 years 11 months ago
On Robust Key Agreement Based on Public Key Authentication
—This paper discusses public-key authenticated key agreement protocols. First, we critically analyze several authenticated key agreement protocols and uncover various theoretical...
Feng Hao
CRYPTO
2011
Springer
237views Cryptology» more  CRYPTO 2011»
12 years 7 months ago
Bi-Deniable Public-Key Encryption
In CRYPTO 1997, Canetti et al.put forward the intruiging notion of deniable encryption, which (informally) allows a sender and/or receiver, having already performed some encrypted...
Adam O'Neill, Chris Peikert, Brent Waters
FC
2004
Springer
80views Cryptology» more  FC 2004»
14 years 1 months ago
Practical Anonymity for the Masses with MorphMix
MorphMix is a peer-to-peer circuit-based mix network to provide practical anonymous low-latency Internet access for millions of users. The basic ideas of MorphMix have been publish...
Marc Rennhard, Bernhard Plattner
NAR
2011
191views Computer Vision» more  NAR 2011»
12 years 10 months ago
The protein common interface database (ProtCID) - a comprehensive database of interactions of homologous proteins in multiple cr
The protein common interface database (ProtCID) is a database that contains clusters of similar homodimeric and heterodimeric interfaces observed in multiple crystal forms (CFs). ...
Qifang Xu, Roland L. Dunbrack Jr.
IV
2008
IEEE
89views Visualization» more  IV 2008»
14 years 2 months ago
A Practical Way for Projects to Visualize Design Rationale
Design rationale remains poorly explained and rarely modelled on projects in industry. However, the reasons for design decisions are important when a specification has to be re-ex...
Ian Alexander