Sciweavers

1834 search results - page 217 / 367
» Public Key Cryptography
Sort
View
NAR
2006
134views more  NAR 2006»
13 years 9 months ago
The MPI Bioinformatics Toolkit for protein sequence analysis
The MPI Bioinformatics Toolkit is an interactive web service which offers access to a great variety of public and in-house bioinformatics tools. They are grouped into different se...
Andreas Biegert, Christian Mayer, Michael Remmert,...
OR
2006
Springer
13 years 9 months ago
An AHP model for construction contractor prequalification
Given that contractor plays a critical role in any construction project, contractor selection constitutes key decision for public authorities. Prequalification, i.e. the eliminati...
K. P. Anagnostopoulos, A. P. Vavatsikos
KES
2010
Springer
13 years 7 months ago
Visualization and Language Processing for Supporting Analysis across the Biomedical Literature
Finding relevant publications in the large and rapidly growing body of biomedical literature is challenging. Search queries on PubMed often return thousands of publications and it ...
Carsten Görg, Hannah J. Tipney, Karin Verspoo...
PKC
2009
Springer
116views Cryptology» more  PKC 2009»
14 years 9 months ago
Improving the Boneh-Franklin Traitor Tracing Scheme
Abstract. Traitor tracing schemes are cryptographically secure broadcast methods that allow identification of conspirators: if a pirate key is generated by k traitors out of a stat...
Pascal Junod, Alexandre Karlov, Arjen K. Lenstra
ACNS
2009
Springer
168views Cryptology» more  ACNS 2009»
14 years 3 months ago
How to Extract and Expand Randomness: A Summary and Explanation of Existing Results
Abstract. We examine the use of randomness extraction and expansion in key agreement (KA) protocols to generate uniformly random keys in the standard model. Although existing works...
Yvonne Cliff, Colin Boyd, Juan Manuel Gonzá...