Sciweavers

1895 search results - page 285 / 379
» Modular Functional Descriptions
Sort
View
CHES
2010
Springer
187views Cryptology» more  CHES 2010»
13 years 9 months ago
Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs - (Full Version)
The power of side-channel leakage attacks on cryptographic implementations is evident. Today's practical defenses are typically attack-specific countermeasures against certain...
Kimmo Järvinen, Vladimir Kolesnikov, Ahmad-Re...
CRYPTO
2010
Springer
171views Cryptology» more  CRYPTO 2010»
13 years 9 months ago
Credential Authenticated Identification and Key Exchange
Secure two-party authentication and key exchange are fundamental problems. Traditionally, the parties authenticate each other by means of their identities, using a public-key infr...
Jan Camenisch, Nathalie Casati, Thomas Groß,...
BMCBI
2008
87views more  BMCBI 2008»
13 years 8 months ago
Protein structure search and local structure characterization
Background: Structural similarities among proteins can provide valuable insight into their functional mechanisms and relationships. As the number of available three-dimensional (3...
Shih-Yen Ku, Yuh-Jyh Hu
BMCBI
2007
118views more  BMCBI 2007»
13 years 8 months ago
A topological algorithm for identification of structural domains of proteins
Background: Identification of the structural domains of proteins is important for our understanding of the organizational principles and mechanisms of protein folding, and for ins...
Frank Emmert-Streib, Arcady R. Mushegian
BMCBI
2010
164views more  BMCBI 2010»
13 years 8 months ago
Investigating the validity of current network analysis on static conglomerate networks by protein network stratification
Background: A molecular network perspective forms the foundation of systems biology. A common practice in analyzing protein-protein interaction (PPI) networks is to perform networ...
Minlu Zhang, Long J. Lu