<--- Back to Details
First PageDocument Content
Science / Humana Press / Methods in Molecular Biology / Springer Protocols / International Standard Serial Number / OhioLINK / Communications protocol / Research methods / Information / Data
Date: 2011-03-16 11:15:23
Science
Humana Press
Methods in Molecular Biology
Springer Protocols
International Standard Serial Number
OhioLINK
Communications protocol
Research methods
Information
Data

CWRU and Associated Libraries

Add to Reading List

Source URL: www.case.edu

Download Document from Source Website

File Size: 1,89 MB

Share Document on Facebook

Similar Documents

Mass media / Springer Science+Business Media / Springer Protocols / Humana Press / Springer / Publishing / Academic publishing / Research methods

Microsoft Word - Document in Microsoft Internet Explorer

DocID: 1gyPM - View Document

Secure two-party computation / Oblivious transfer / Alice and Bob / Cryptography / Cryptographic protocols / Secure multi-party computation

Review of5 Efficient Secure Two-Party Protocols: Techniques and Constructions by Carmit Hazay and Yehuda Lindell Springer, 2010 Reviewed by Jonathan Katz

DocID: 1g9Np - View Document

Extracellular / Intracellular / Cell membrane / Properties of water / Biology / Cell biology / Cryopreservation

International Series of Numerical Mathematics, Vol. 160, 521–540 c 2012 Springer Basel AG ⃝ Freezing of Living Cells: Mathematical Models and Design of Optimal Cooling Protocols

DocID: 1afRH - View Document

Springer Science+Business Media / Science / Computational biology / Molecular biology / Molecular medicine / Cell biology / Kürşad Türkşen / Current Protocols / Nature Protocols / Biology / Databases / Springer Protocols

SpringerProtocols Content Questions or updates email: Item 1 2 3

DocID: 13EVG - View Document

Commitment scheme / Universal composability / Oblivious transfer / Semantic security / RSA / Diffie–Hellman key exchange / Communications protocol / Cipher / Cryptography / Cryptographic protocols / ID-based encryption

An extended abstract of this paper appears in Kaoru Kurosawa (Ed.): Advances in Cryptology ASIACRYPT 2007, volume 4833 of Lecture Notes in Computer Science, pages 265–282, Springer-Verlag, 2007. This is the full versio

DocID: 13lu3 - View Document