RFID-tags are becoming very popular tools for identification of products. As they have a small microchip on board, they offer functionality that can be used for security purposes. ...
Bellare, Canetti and Krawczyk proposed a security model (BCK-model) for authentication and key exchange protocols in 1998. The model not only reasonably captures the power of pract...
A series of recent papers have demonstrated collision attacks on popularly used hash functions, including the widely deployed MD5 and SHA-1 algorithm. To assess this threat, the na...
Bioinformaticians are accustomed to going through analysis steps, in which they employ several data sources, like protein sequence and protein interaction databases, to carry out t...
Farzad Kohantorabi, Gregory Butler, Christopher J....