Sciweavers

1834 search results - page 357 / 367
» Public Key Cryptography
Sort
View
CN
2008
128views more  CN 2008»
13 years 7 months ago
Autonomous security for autonomous systems
The Internet's interdomain routing protocol, BGP, supports a complex network of Autonomous Systems which is vulnerable to a number of potentially crippling attacks. Several p...
Josh Karlin, Stephanie Forrest, Jennifer Rexford
DCC
2010
IEEE
13 years 7 months ago
Efficient hybrid encryption from ID-based encryption
This paper deals with generic transformations from ID-based key encapsulation mechanisms (IBKEM) to hybrid public-key encryption (PKE). The best generic transformation known until...
Masayuki Abe, Yang Cui, Hideki Imai, Eike Kiltz
DEBU
2008
149views more  DEBU 2008»
13 years 7 months ago
Semantics enhanced Services: METEOR-S, SAWSDL and SA-REST
Services Research Lab at the Knoesis center and the LSDIS lab at University of Georgia have played a significant role in advancing the state of research in the areas of workflow m...
Amit P. Sheth, Karthik Gomadam, Ajith Ranabahu
BMCBI
2006
120views more  BMCBI 2006»
13 years 7 months ago
SCOWLP: a web-based database for detailed characterization and visualization of protein interfaces
Background: Currently there is a strong need for methods that help to obtain an accurate description of protein interfaces in order to be able to understand the principles that go...
Joan Teyra, Andreas Doms, Michael Schroeder, M. Te...
BMCBI
2006
102views more  BMCBI 2006»
13 years 7 months ago
MycoperonDB: a database of computationally identified operons and transcriptional units in Mycobacteria
Background: A key post genomics challenge is to identify how genes in an organism come together and perform physiological functions. An important first step in this direction is t...
Sarita Ranjan, Ranjit Kumar Gundu, Akash Ranjan