Learn More
Emerging infectious diseases are reducing biodiversity on a global scale. Recently, the emergence of the chytrid fungus Batrachochytrium salamandrivorans resulted in rapid declines in populations of European fire salamanders. Here, we screened more than 5000 amphibians from across four continents and combined experimental assessment of pathogenicity with(More)
The evidence for amphibian population declines is based on count data that were not adjusted for detection probabilities. Such data are not reliable even when collected using standard methods. The formula C = Np (where C is a count, N the true parameter value, and p is a detection probability) relates count data to demography, population size, or(More)
Although there is growing concern that amphibian populations are declining globally, much of the supporting evidence is either anecdotal or derived from short-term studies at small geographical scales. This raises questions not only about the difficulty of detecting temporal trends in populations which are notoriously variable, but also about the validity(More)
BACKGROUND Rescuing amphibian diversity is an achievable conservation challenge. Disease mitigation is one essential component of population management. Here we assess existing disease mitigation strategies, some in early experimental stages, which focus on the globally emerging chytrid fungus Batrachochytrium dendrobatidis. We discuss the precedent for(More)
Computer-aided verification provides effective means of analyzing the security of cryptographic primitives. However, it has remained a challenge to achieve fully automated analyses yielding guarantees that hold against computational (rather than symbolic) attacks. This paper meets this challenge for public-key encryption schemes built from trapdoor(More)
Recent work on structure-preserving signatures studies optimality of these schemes in terms of the number of group elements needed in the verification key and the signature, and the number of pairing-product equations in the verification algorithm. While the size of keys and signatures is crucial for many applications, another important aspect to consider(More)
Information theory and the framework of information dynamics have been used to provide tools to characterise complex systems. In particular, we are interested in quantifying information storage , information modification and information transfer as characteristic elements of computation. Although these quantities are defined for autonomous dynamical(More)
—We present a general approach for the symbolic analysis of security protocols that use Diffie-Hellman expo-nentiation to achieve advanced security properties. We model protocols as multiset rewriting systems and security properties as first-order formulas. We analyze them using a novel constraint-solving algorithm that supports both falsification and(More)