نتایج جستجو برای: long protocol

تعداد نتایج: 1006085  

Journal: :The Journal of physiology 2001
K Kubo H Kanehisa T Fukunaga

1. The present study aimed to investigate the influence of isometric training protocols with long- and short-duration contractions on the elasticity of human tendon structures in vivo. The elasticity was assessed through in vivo determination of the elongation (L) of the tendons and aponeuroses using ultrasonography, while the subjects performed ramp isometric exercise up to maximum voluntary c...

2007
Ran Canetti Ling Cheung Dilsun Kirli Kaynar Nancy A. Lynch Olivier Pereira

For many cryptographic protocols, security relies on the assumption that adversarial entities have limited computational power. This type of security degrades progressively over the lifetime of a protocol. However, some cryptographic services, such as timestamping services or digital archives, are long-lived in nature; they are expected to be secure and operational for a very long time (i.e., s...

Journal: :IACR Cryptology ePrint Archive 2008
Ran Canetti Ling Cheung Dilsun Kirli Kaynar Nancy A. Lynch Olivier Pereira

For many cryptographic protocols, security relies on the assumption that adversarial entities have limited computational power. This type of security degrades progressively over the lifetime of a protocol. However, some cryptographic services, such as timestamping services or digital archives, are long-lived in nature; they are expected to be secure and operational for a very long time (i.e., s...

2008
Ran Canetti Ling Cheung Dilsun Kaynar Nancy Lynch Olivier Pereira

For many cryptographic protocols, security relies on the assumption that adversarial entities have limited computational power. This type of security degrades progressively over the lifetime of a protocol. However, some cryptographic services, such as timestamping services or digital archives, are long-lived in nature; they are expected to be secure and operational for a very long time (i.e., s...

2006
Zhan Liu Mi Lu

This paper present a new protocol based on symmetric encryption, which has quasi-forward secrecy and resistance to quasi-key compromise impersonation. It is a protocol suitable for computation-limited devices. Also by blinding the long-term key, we make the attack to long-term key harder.We have done the theoretical analysis and will finish the simulation and implementation.

2017
Ruolin Wang Shouren Lin Yong Wang Weiping Qian Liang Zhou

OBJECTIVE To evaluate the effectiveness and safety of gonadotropin-releasing hormone antagonist (GnRH-ant) protocol and gonadotropin-releasing hormone agonist (GnRH-a) long protocol in patients with normal ovarian reserve. METHODS We searched the PubMed (1992-2016), Cochrane Library (1999-2016), Web of Science (1950-2016), Chinese Biomedical Database (CBM, 1979-2016), and China National Knowl...

The present study investigated the acute and short-term effects of oral feeding of jujube solution on blood platelets and its morphological indices in response to circuit resistance exercise. Fourteen young male volunteer students were randomly divided into the placebo and jujube solution groups. All participants performed one circuit resistance exercise[9stations/nonstop, 30 seconds for each s...

2014
Ercan Bastu Cenk Yasa Ozlem Dural Mehmet Firat Mutlu Cem Celik Funda Gungor Ugurlucan Faruk Buyru

BACKGROUND AND OBJECTIVES The aim of this study was to compare the in vitro fertilization (IVF) outcomes of long gonadotropin-releasing hormone agonist (GnRH-a) and GnRH-antagonist (GnRH-ant) protocols in endometriosis patients who have undergone laparoscopic endometrioma resection surgery. To our knowledge, there is no study in the current literature that compares the effectiveness of long GnR...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید