Sciweavers

328 search results - page 66 / 66
» Identity-Enriched Session Management
Sort
View
CCS
2008
ACM
13 years 7 months ago
Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
Ralf Küsters, Tomasz Truderung
JUCS
2006
95views more  JUCS 2006»
13 years 5 months ago
POCA : A User Distributions Algorithm in Enterprise Systems with Clustering
Abstract: As enterprises worldwide race to improve real-time management to improve productivity, customer services and flexibility, huge resources have been invested into enterpris...
Ping-Yu Hsu, Ping-Ho Ting
NAR
2008
159views more  NAR 2008»
13 years 5 months ago
The UCSC Genome Browser Database: 2008 update
The University of California, Santa Cruz, Genome Browser Database (GBD) provides integrated sequence and annotation data for a large collection of vertebrate and model organism ge...
Donna Karolchik, Robert M. Kuhn, Robert Baertsch, ...