Sciweavers

1282 search results - page 142 / 257
» Signing on signing off
Sort
View
MMMACNS
2001
Springer
14 years 2 months ago
Open Issues in Formal Methods for Cryptographic Protocol Analysis
The history of the application of formal methods to cryptographic protocol analysis spans nearly twenty years, and recently has been showing signs of new maturity and consolidatio...
Catherine Meadows
WABI
2001
Springer
138views Bioinformatics» more  WABI 2001»
14 years 2 months ago
Algorithms for Finding Gene Clusters
Abstract. Comparing gene orders in completely sequenced genomes is a standard approach to locate clusters of functionally associated genes. Often, gene orders are modeled as permut...
Steffen Heber, Jens Stoye
WABI
2001
Springer
112views Bioinformatics» more  WABI 2001»
14 years 2 months ago
Finding an Optimal Inversion Median: Experimental Results
We derive a branch-and-bound algorithm to find an optimal inversion median of three signed permutations. The algorithm prunes to manageable size an extremely large search tree usi...
Adam C. Siepel, Bernard M. E. Moret
ACSAC
2000
IEEE
14 years 2 months ago
Personal Security Environment on Palm PDA
Digital signature schemes are based on the assumption that the signing key is kept in secret. Ensuring that this assumption holds is one of the most crucial problems for all curre...
Margus Freudenthal, S. Heiberg, Jan Willemson
ADG
2000
Springer
122views Mathematics» more  ADG 2000»
14 years 2 months ago
Automated Theorem Proving in Incidence Geometry - A Bracket Algebra Based Elimination Method
In this paper we propose a bracket algebra based elimination method for automated generation of readable proofs for theorems in incidence geometry. This method is based on two tech...
Hongbo Li, Yihong Wu