Sciweavers

157 search results - page 31 / 32
» A Universally Composable Mix-Net
Sort
View
CRYPTO
2010
Springer
171views Cryptology» more  CRYPTO 2010»
13 years 6 months ago
Credential Authenticated Identification and Key Exchange
Secure two-party authentication and key exchange are fundamental problems. Traditionally, the parties authenticate each other by means of their identities, using a public-key infr...
Jan Camenisch, Nathalie Casati, Thomas Groß,...
BMCBI
2006
145views more  BMCBI 2006»
13 years 5 months ago
Querying the public databases for sequences using complex keywords contained in the feature lines
Background: High throughput technologies often require the retrieval of large data sets of sequences. Retrieval of EMBL or GenBank entries using keywords is easy using tools such ...
Olivier Croce, Michaël Lamarre, Richard Chris...
NC
2008
122views Neural Networks» more  NC 2008»
13 years 5 months ago
Computation with finite stochastic chemical reaction networks
A highly desired part of the synthetic biology toolbox is an embedded chemical microcontroller, capable of autonomously following a logic program specified by a set of instructions...
David Soloveichik, Matthew Cook, Erik Winfree, Jeh...
JOT
2007
170views more  JOT 2007»
13 years 5 months ago
Enough of Processes - Lets do Practices
All modern software development processes try to help project teams conduct their work. While there are some important differences between them, the commonalities are far greater ...
Ivar Jacobson, Pan Wei Ng, Ian Spence
JCC
2011
154views more  JCC 2011»
12 years 8 months ago
Can we trust docking results? Evaluation of seven commonly used programs on PDBbind database
: Docking is one of the most commonly used techniques in drug design. It is used for both identifying correct poses of a ligand in the binding site of a protein as well as for the ...
Dariusz Plewczynski, Michal Lazniewski, Rafal Augu...