Sciweavers

82 search results - page 17 / 17
» Selected Methods of Model Checking Using SAT and SMT-Solvers
Sort
View
CCS
2005
ACM
14 years 3 months ago
Direct chosen ciphertext security from identity-based techniques
We describe a new encryption technique that is secure in the standard model against adaptive chosen ciphertext (CCA2) attacks. We base our method on two very efficient Identity-Ba...
Xavier Boyen, Qixiang Mei, Brent Waters
BMCBI
2007
174views more  BMCBI 2007»
13 years 10 months ago
Inferring activity changes of transcription factors by binding association with sorted expression profiles
Background: The identification of transcription factors (TFs) associated with a biological process is fundamental to understanding its regulatory mechanisms. From microarray data,...
Chao Cheng, Xiting Yan, Fengzhu Sun, Lei M. Li