نتایج جستجو برای: attacks

تعداد نتایج: 57358  

Journal: :Behavior therapy 2007
Norman B Schmidt J Anthony Richey Kiara R Cromer Julia D Buckner

Discomfort intolerance, defined as an individual difference in the capacity to tolerate unpleasant bodily sensations, is a construct recently posited as a risk factor for panic and anxiety psychopathology. The present report used a biological challenge procedure to evaluate whether discomfort intolerance predicts fearful responding beyond the effects of trait anxiety and a well-established psyc...

Journal: :Behaviour research and therapy 2004
Roger Baker Jane Holloway Peter W Thomas Sarah Thomas Matthew Owens

In this paper Rachman's concept of emotional processing was extended and a model highlighting the psychological operations underpinning processing was specified. Using this model, the aim was to investigate, by means of a questionnaire, whether patients with panic disorder (n=50) have more emotional processing difficulties than two samples of healthy controls (London, n=406; Aberdeen, n=125). T...

Journal: :journal of research in medical sciences 0
mohammad dehghani firoozabadi maryam navabzadeh mohammad khodashenas roudsari mohsen zahmatkash

background: migraine headaches are the most common acute and recurrent headaches. current treatment of a migraine headache consists of multiple medications for control and prevention of recurrent attacks. global emergence of alternative medicine led us to examine the efficacy of cupping therapy plus serkangabin syrup in the treatment of migraine headaches. materials and methods: this study was ...

A. Hakimi, S. Mohammadi, S. Talebi,

In this paper we introduce two innovative image and video watermarking algorithms. The paper’s main emphasis is on the use of chaotic maps to boost the algorithms’ security and resistance against attacks. By encrypting the watermark information in a one dimensional chaotic map, we make the extraction of watermark for potential attackers very hard. In another approach, we select embedding po...

ΑΕS _ CMCCv₁, ΑVΑLΑNCHEv₁, CLΟCv₁, and SILCv₁ are four candidates of the first round of CAESAR. CLΟCv₁ is presented in FSE 2014 and SILCv₁ is designed upon it with the aim of optimizing the hardware implementation cost. In this paper, structural weaknesses of these candidates are studied. We present distinguishing attacks against ΑES  _ CMCCv₁ with the complexity of two queries and the success ...

Journal: :Groups – Complexity – Cryptology 2009

Journal: :SSRN Electronic Journal 1994

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید