Sciweavers

530 search results - page 52 / 106
» Practical Threshold Signatures
Sort
View
ANCS
2007
ACM
13 years 12 months ago
Curing regular expressions matching algorithms from insomnia, amnesia, and acalculia
The importance of network security has grown tremendously and a collection of devices have been introduced, which can improve the security of a network. Network intrusion detectio...
Sailesh Kumar, Balakrishnan Chandrasekaran, Jonath...
BMCBI
2008
135views more  BMCBI 2008»
13 years 8 months ago
Identification of a small optimal subset of CpG sites as bio-markers from high-throughput DNA methylation profiles
Background: DNA methylation patterns have been shown to significantly correlate with different tissue types and disease states. High-throughput methylation arrays enable large-sca...
Hailong Meng, Edward Lenn Murrelle, Guoya Li
ASIACRYPT
2001
Springer
13 years 11 months ago
Efficient Zero-Knowledge Authentication Based on a Linear Algebra Problem MinRank
A Zero-knowledge protocol provides provably secure entity authentication based on a hard computational problem. Among many schemes proposed since 1984, the most practical rely on f...
Nicolas Courtois
ACSAC
2000
IEEE
14 years 12 days ago
Enabling Secure On-Line DNS Dynamic Update
Domain Name System (DNS) is the system for the mapping between easily memorizable host names and their IP addresses. Due to its criticality, security extensions to DNS have been p...
Xunhua Wang, Yih Huang, Yvo Desmedt, David Rine
BMCBI
2008
109views more  BMCBI 2008»
13 years 8 months ago
MetaFIND: A feature analysis tool for metabolomics data
Background: Metabolomics, or metabonomics, refers to the quantitative analysis of all metabolites present within a biological sample and is generally carried out using NMR spectro...
Kenneth Bryan, Lorraine Brennan, Padraig Cunningha...