Sciweavers

5722 search results - page 300 / 1145
» Security Function Interactions
Sort
View
IACR
2011
107views more  IACR 2011»
14 years 3 months ago
Structure Preserving CCA Secure Encryption and Its Application to Oblivious Third Parties
In this paper we present the first public key encryption scheme that is structure preserving, i.e., our encryption scheme uses only algebraic operations. In particular it does not...
Jan Camenisch, Kristiyan Haralambiev, Markulf Kohl...
ICSE
2001
IEEE-ACM
15 years 7 months ago
Functional Paleontology: System Evolution as the User Sees It
It has long been accepted that requirements analysis should precede architectural design and implementation, but in software evolution and reverse engineering this concern with bl...
Annie I. Antón, Colin Potts
128
Voted
BMCBI
2010
112views more  BMCBI 2010»
15 years 3 months ago
Orientation-dependent backbone-only residue pair scoring functions for fixed backbone protein design
Background: Empirical scoring functions have proven useful in protein structure modeling. Most such scoring functions depend on protein side chain conformations. However, backbone...
Andrew J. Bordner
BMCBI
2008
121views more  BMCBI 2008»
15 years 3 months ago
iRefIndex: A consolidated protein interaction database with provenance
Background: Interaction data for a given protein may be spread across multiple databases. We set out to create a unifying index that would facilitate searching for these data and ...
Sabry Razick, George Magklaras, Ian M. Donaldson
166
Voted
BMCBI
2011
14 years 7 months ago
Assessing the functional coherence of modules found in multiple-evidence networks from Arabidopsis
Background: Combining multiple evidence-types from different information sources has the potential to reveal new relationships in biological systems. The integrated information ca...
Artem Lysenko, Michael Defoin-Platel, Keywan Hassa...