نتایج جستجو برای: strand protocol
تعداد نتایج: 284992 فیلتر نتایج به سال:
Associations between physiological reactivity to exclusion (i.e., heart rate [HRR], respiratory sinus arrhythmia [RSAR], and skin conductance [SCR]) and relational and physical aggression were assessed. It was hypothesized that blunted "fight or flight" responses to stress (i.e., blunted HRR, SCR, and RSA withdrawal) would be associated with relational aggression, whereas heightened "fight or f...
The vulnerability and importance of computers, robots, internet etc, demand the employment of exceedingly reliable security protocols. E-Business can not be encouraged with susceptible underlying security protocols. We present a heuristic state space search model for automatic security protocol verification. Our model exploits its knowledge of the search space and intelligently enhances the eff...
The hybridization of complementary nucleic acid strands is the most basic of all reactions involving nucleic acids, but has a major limitation: the specificity of hybridization reactions depends critically on the lengths of the complementary pairs of strands and can drop (in the presence of other competing strands whose sequences are close to that of a given target strand) to very low values if...
The design of large scale DNA sequencing projects such as genome analysis demands a new approach to sequencing strategy, since neither a purely random nor a purely directed method is satisfactory. We have developed a strategy that combines these two methods in a way that preserves the advantages of both while avoiding their particular limitations. Computer simulations showed that a specific bal...
Modern molecular biology techniques have been applied to the production of therapeutic antibodies. Nonetheless, recombinant antibodies remain the exception rather than the rule for the antibodies used in most research and diagnostic applications. The lack of penetration of recombinant antibodies into the research arena can be attributed largely to the fact that the Ig gene families are large an...
Causal reasoning is a powerful tool in analysing security protocols, as seen in the popularity of the strand space model. However, for protocols that branch, more subtle models are called for to capture the ways in which they can interact with a possibly malign environment. We study a model for security protocols encompassing causal reasoning and interaction, developing a semantics for a simple...
A type flaw attack on a security protocol is an attack in which a field in a message that was originally intended to have one type is subsequently interpreted as having another type. Heather et al. proved that type flaw attacks can be prevented by tagging each field with the information that indicates its intended type. We simplify Heather et al.’s tagging scheme by combining all the tags insid...
The cloud-assisted Body Sensor Networks (BSN) often has an architecture of Multi-hop Wireless Networks (MWN) model, in which both the body sensors and the users must be secure to protect the whole infrastructure. Unfortunately, both the information providers and the users are movable and resource-constrained in communication and computation. Thus some new security problems are proposed, such as...
Location-dependent services are services that adapt their behavior based on the locations of mobile devices. For many applications, it is critical that location-dependent services use trustworthy device locations, namely locations that are both accurate and recent. These properties are captured by a security goal called locale authentication whereby an entity can authenticate the physical locat...
The reprogramming of somatic cells to induced pluripotent stem cells (iPS) has successfully been performed in different mammalian species including mouse, rat, human, pig and others. The verification of iPS clones mainly relies on the detection of the endogenous expression of different pluripotency genes. These genes mostly represent transcription factors which are located in the cell nucleus. ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید