Sciweavers

82 search results - page 17 / 17
» Selected Methods of Model Checking Using SAT and SMT-Solvers
Sort
View
CCS
2005
ACM
13 years 10 months ago
Direct chosen ciphertext security from identity-based techniques
We describe a new encryption technique that is secure in the standard model against adaptive chosen ciphertext (CCA2) attacks. We base our method on two very efficient Identity-Ba...
Xavier Boyen, Qixiang Mei, Brent Waters
BMCBI
2007
174views more  BMCBI 2007»
13 years 5 months ago
Inferring activity changes of transcription factors by binding association with sorted expression profiles
Background: The identification of transcription factors (TFs) associated with a biological process is fundamental to understanding its regulatory mechanisms. From microarray data,...
Chao Cheng, Xiting Yan, Fengzhu Sun, Lei M. Li