Sciweavers

3147 search results - page 175 / 630
» Statistically Hiding Sets
Sort
View
CISC
2009
Springer
185views Cryptology» more  CISC 2009»
14 years 9 months ago
Algebraic Cryptanalysis of Curry and Flurry Using Correlated Messages
In [10], Buchmann, Pyshkin and Weinmann have described two families of Feistel and SPN block ciphers called Flurry and Curry respectively. These two families of ciphers are fully p...
Jean-Charles Faugère, Ludovic Perret
108
Voted
INFOCOM
2010
IEEE
14 years 10 months ago
A Node-failure-resilient Anonymous Communication Protocol through Commutative Path Hopping
Abstract—With rising concerns on user privacy over the Internet, anonymous communication systems that hide the identity of a participant from its partner or third parties are hig...
Fengjun Li, Bo Luo, Peng Liu, Chao-Hsien Chu
BMCBI
2007
141views more  BMCBI 2007»
14 years 11 months ago
A novel approach to detect hot-spots in large-scale multivariate data
Background: Progressive advances in the measurement of complex multifactorial components of biological processes involving both spatial and temporal domains have made it difficult...
Jianhua Wu, Keith M. Kendrick, Jianfeng Feng
BMCBI
2005
121views more  BMCBI 2005»
14 years 11 months ago
Comparison of seven methods for producing Affymetrix expression scores based on False Discovery Rates in disease profiling data
Background: A critical step in processing oligonucleotide microarray data is combining the information in multiple probes to produce a single number that best captures the express...
Kerby Shedden, Wei Chen, Rork Kuick, Debashis Ghos...
84
Voted
BMCBI
2008
114views more  BMCBI 2008»
14 years 12 months ago
Visualizing and clustering high throughput sub-cellular localization imaging
Background: The expansion of automatic imaging technologies has created a need to be able to efficiently compare and review large sets of image data. To enable comparisons of imag...
Nicholas A. Hamilton, Rohan D. Teasdale