نتایج جستجو برای: known as sepah
تعداد نتایج: 5882655 فیلتر نتایج به سال:
We analyse several well-known key establishment protocols for mobile communications. The protocols are examined with respect to their security and suitability in mobile environments. In a number of cases weaknesses are pointed out, and in many cases reenements are suggested, either to improve the eeciency or to allow simpliied security analysis.
One of the approaches to deliver real-time video encryption is to apply permutations to the bytes within a frame of a fully encoded MPEG stream as presented in [2]. We demonstrate that this particular algorithm is vulnerable to a known-plaintext attack, and hence its use should be carefully considered. We also discuss modifications that can make the algorithm resistant to our attack.
For several years now, you’ve been hearing and reading about an emerging standard that everybody has been calling SQL3. Intended as a major enhancement of the current second generation SQL standard, commonly called SQL-92 because of the year it was published, SQL3 was originally planned to be issued in about 1996...but things didn’t go as planned. As you may be aware, SQL3 has been characterize...
This analysis attempts to answer the question of whether similar molecules crystallize in a similar manner. An analysis of structures in the Cambridge Structural Database shows that the answer is yes - sometimes they do, particularly for single-component structures. However, one does need to define what we mean by similar in both cases. Building on this observation we then demonstrate how this ...
In this paper the author presents medicinal or otherwise useful weed species with details of family, vernacular name and its medicinal utility. Information on other general economic importance of medicinal weeds is also described here.
In the classical approach to digital topology (see e.g. [12] and [13]), graph theoretic tools are used for structuring Z, namely the well-known binary relations of 4-adjacency and 8-adjacency. But neither 4adjacency nor 8-adjacency itself allows an analogue of the Jordan curve theorem (cf. [9]) and, therefore, one has to use a combination of the two adjacencies. To overcome this disadvantage, a...
Superunification underwent a major paradigm shift in 1984 when eleven-dimensional supergravity was knocked off its pedestal by ten-dimensional superstrings. This last year has witnessed a new shift of equal proportions: perturbative ten-dimensional superstrings have in their turn been superseded by a new non-perturbative theory called M-theory, which describes supermembranes and superfivebranes...
The PRINTS database houses a collection of protein family fingerprints. These are groups of motifs that together are diagnostically more potent than single motifs by virtue of the biological context afforded by matching motif neighbours. Around 1200 fingerprints have now been created and stored in the database. The September 1999 release (version 24.0) encodes approximately 7200 motifs, coverin...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید