Sciweavers

4820 search results - page 195 / 964
» Implementing Signatures for C
Sort
View
FLAIRS
2008
15 years 5 months ago
Contrast Pattern Mining with Gap Constraints for Peptide Folding Prediction
1 In this paper, we propose a peptide folding prediction method which discovers contrast patterns to differentiate and predict peptide folding classes. A contrast pattern is defin...
Chinar C. Shah, Xingquan Zhu, Taghi M. Khoshgoftaa...
129
Voted
DRM
2008
Springer
15 years 5 months ago
RSA-TBOS signcryption with proxy re-encryption
The recent attack on Apple iTunes Digital Rights Management [17] has brought to light the usefulness of proxy re-encryption schemes for Digital Rights Management. It is known that...
Varad Kirtane, C. Pandu Rangan
FAST
2003
15 years 4 months ago
Pond: The OceanStore Prototype
OceanStore is an Internet-scale, persistent data store designed for incremental scalability, secure sharing, and long-term durability. Pond is the OceanStore prototype; it contain...
Sean C. Rhea, Patrick R. Eaton, Dennis Geels, Haki...
CCR
2010
133views more  CCR 2010»
15 years 3 months ago
The role of network trace anonymization under attack
In recent years, academic literature has analyzed many attacks on network trace anonymization techniques. These attacks usually correlate external information with anonymized data...
Martin Burkhart, Dominik Schatzmann, Brian Trammel...
CORR
2010
Springer
112views Education» more  CORR 2010»
15 years 3 months ago
Little Dragon Two: An efficient Multivariate Public Key Cryptosystem
In 1998 [8], Patarin proposed an efficient cryptosystem called Little Dragon which was a variant of Matsumoto Imai cryptosystem C . However Patarin later found that Little Dragon ...
Rajesh P. Singh, Anupam Saikia, B. K. Sarma