Learn More
It is generally accepted from the darwinian theory of evolution that a progressive increase in population adaptation will occur in populations containing genetic variation in fitness, until a stable equilibrium is reached and/or the additive genetic variation is exhausted. However, the theoretical literature of population genetics documents exceptions where(More)
A yeast strain lacking a functional copy of ADH1 has been isolated that is resistant to antimycin A because of the presence of multiple copies of a nuclear gene, ADH4. The amplified copies of ADH4 exist on linear molecules 42 kb in length, which can be separated from chromosomal DNA by orthogonal-field-alternation gel electrophoresis. These amplified(More)
Existing cryptographic realizations of privacy-friendly authentication mechanisms such as anonymous credentials, minimal disclosure tokens, self-blindable credentials, and group signatures vary largely in the features they offer and in how these features are realized. Some features such as revocation or de-anonymization even require the combination of(More)
The research leading to these results has received funding from the European Community's Seventh Framework Programme (FP7/2007-2013) under grant agreement n° 257782 for the project Attribute-based Credentials for Trust (ABC4Trust) as part of the " ICT Trust and Security Research " theme. Abstract The goal of ABC4Trust is to address the federation and(More)
Die Online-Fachbuchhandlung beck-shop.de ist spezialisiert auf Fachbücher, insbesondere Recht, Steuern und Wirtschaft. Im Sortiment finden Sie alle Medien (Bücher, Zeitschriften, CDs, eBooks, etc.) aller Verlage. Ergänzt wird das Programm durch Services wie Neuerscheinungsdienst oder Zusammenstellungen von Büchern zu Sonderpreisen. Der Shop führt mehr als 8(More)
LIMITED DISTRIBUTION NOTICE This report will be distributed outside of IBM up to one year after the IBM publication date. Abstract. Existing cryptographic realizations of privacy-friendly authentication mechanisms such as anonymous credentials, minimal disclosure tokens, self-blindable credentials, and group signatures vary largely in the features they(More)
  • 1