Formal methods are a popular means to specify and verify security properties of a variety of communication protocols. In this article we take a step towards the use of team automa...
Maurice H. ter Beek, Gabriele Lenzini, Marinella P...
A Zero-knowledge protocol provides provably secure entity authentication based on a hard computational problem. Among many schemes proposed since 1984, the most practical rely on f...
In this paper, a new method of feature extraction with rotation invariant property is presented. One of the main contributions of this study is that a rotation invariant signature...
In a (r, n)-threshold secret sharing scheme, no group of (r - 1) colluding members can recover the secret value s. However, the number of colluders is likely to increase over time...
Background: Microarray co-expression signatures are an important tool for studying gene function and relations between genes. In addition to genuine biological co-expression, corr...