We present a discretionary access control framework that can be used to control a principal’s ability to link information from two or more audit records and compromise a user’...
Abstract. Cryptographic protocols are often designed and analyzed under some trusted set-up assumptions, namely in settings where the participants have access to global information...
Ran Canetti, Yevgeniy Dodis, Rafael Pass, Shabsi W...
Finding and keeping track of other researchers’ publication lists is an essential activity for every researcher, because they often contain citations not found elsewhere and may...
Background: Hydrophobins are fungal proteins that can turn into amphipathic membranes at hydrophilic/hydrophobic interfaces by self-assembly. The assemblages by Class I hydrophobi...
Abstract—We present a silicon neuron with a dynamic, active leak that enables precise spike-timing with respect to a time-varying input signal. Our neuron models the mammalian bu...