نتایج جستجو برای: the secret agent

تعداد نتایج: 16078161  

2015
Iman Daryaei Mark D Pagel

Two relatively new types of exogenous magnetic resonance imaging contrast agents may provide greater impact for molecular imaging by providing greater specificity for detecting molecular imaging biomarkers. Exogenous chemical exchange saturation transfer (CEST) agents rely on the selective saturation of the magnetization of a proton on an agent, followed by chemical exchange of a proton from th...

Journal: :isecure, the isc international journal of information security 0
m. safkhani computer engineering department, shahid rajaee teacher training university, tehran, iran n. bagheri electrical engineering department, shahid rajaee teacher training university, tehran, iran

recently, baghery et al. [1, 2] presented some attacks on two rfid protocols, namely yoon and jung et al. protocols, and proposed the improved version of them. however, in this note, we show that the improved version of the jung et al. protocol suffers from desynchronization attack and the improved version of the yoon's protocol suffers from secret disclosure attack. the success probabilit...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه صنعتی اصفهان - دانشکده شیمی 1391

in this project, 4,4?-methylenebis(3-chloro-2,6-diethyl trimellitimidobenzene) as a diacid, was prepared by the reaction of trimellitic anhydride (tma) with 4,4?-methylenebis(3-chloro-2,6-diethylaniline) (mcdea). the novel poly(amide-imide) (pai) was synthesized from the reaction of 4,4?-methylenebis(3-chloro-2,6-diethyl trimellitimidobenzene) as a diacid with mcdea under green condition using ...

2003
Dirk Balfanz Glenn Durfee Narendar Shankar Diana K. Smetters Jessica Staddon Hao-Chi Wong

Consider a CIA agent who wants to authenticate herself to a server, but does not want to reveal her CIA credentials unless the server is a genuine CIA outlet. Consider also that the CIA server does not want to reveal its CIA credentials to anyone but CIA agents – not even to other CIA servers. In this paper we first show how pairing-based cryptography can be used to implement such secret handsh...

In this paper, we introduce a method of threshold secret sharing scheme (TSSS) in which secret reconstruction is based on Babai's nearest plane algorithm. In order to supply secure public channels for transmitting shares to parties, we need to ensure that there are no quantum threats to these channels. A solution to this problem can be utilization of lattice-based cryptosystems for these channe...

2011
Noriko Sakano Nobuyuki Miyatake Shoko Murakami Takeshi Suzue Tomohiro Hirao Keiki Ogino

To investigate the changes in temperatures in Okayama area compared with different levels of three urbanization areas such as Tsuyama, Tokyo areas and Hachijo island in Japan. Data of temperatures in Okayama (1891-2009), Tsuyama (1943-2009), Tokyo areas (1876-2009) and Hachijo Island (1907-2009) in Japan was obtained from Japan Meteorological Agency. Changes in temperatures in 4 areas in Japan ...

2005
H. Hamidi

The reliable execution of a mobile agent is a very important design issue in building a mobile agent system and many fault-tolerant schemes have been proposed so far. Security is a major problem of mobile agent systems, especially when money transactions are concerned . Security for the partners involved is handled by encryption methods based on a public key authentication mechanism and by secr...

Journal: :زن در فرهنگ و هنر 0
مهدی حامدسقایان استادیار دانشکدۀ هنر دانشگاه تربیت مدرس منصوره صدیف کارشناس ارشد کارگردانی تئاتر دانشکدۀ هنر دانشگاه تربیت مدرس

in this project have been done in descriptive-analyze method, mid utilize from mythology-psychology by studying women characters in five plays. we are searching traits of “wild woman archetype” in secret defense drama. this archetype has been formed from theories of carel gustave yung, unregarded in literary and artistically studying in my country. important asking in this article is introducin...

2002
Joseph B. Ojiambo

It seems that it’s not just elephants that have long memories. Research by Anthony Gendall and co-workers [Cell (2001) 107, 525–535] shows that plants have a remarkable capacity to ‘remember’ too. Studying the process of vernalization (the acceleration of flowering by exposure to a cold period) in Arabidopsis, the team has identified the ‘memory’ gene, VRN2 (vernalization2). Although VRN2 is no...

2002
Margaret L. Thomson

Silver Queen mint in central British Columbia, is located approximately 35 kilometres south of Houston and 3 kilometres east of 0wt.n Lake (Figure 2-7-1). Although currently inactive, it was worked briefly in the early 1970s for gold. silver, copper, zinc, lead and cadmium. The deposit is hosted by Cretaceous rocks of the informal Tip Top Hill group (78.322.67 Ma, K-Ar whole rock), with the age...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید