نتایج جستجو برای: known as sepah

تعداد نتایج: 5882655  

1998
Colin Boyd Anish Mathuria

We analyse several well-known key establishment protocols for mobile communications. The protocols are examined with respect to their security and suitability in mobile environments. In a number of cases weaknesses are pointed out, and in many cases reenements are suggested, either to improve the eeciency or to allow simpliied security analysis.

Journal: :IACR Cryptology ePrint Archive 2004
Adam J. Slagell

One of the approaches to deliver real-time video encryption is to apply permutations to the bytes within a frame of a fully encoded MPEG stream as presented in [2]. We demonstrate that this particular algorithm is vulnerable to a known-plaintext attack, and hence its use should be carefully considered. We also discuss modifications that can make the algorithm resistant to our attack.

1999
Andrew Eisenberg Jim Melton

For several years now, you’ve been hearing and reading about an emerging standard that everybody has been calling SQL3. Intended as a major enhancement of the current second generation SQL standard, commonly called SQL-92 because of the year it was published, SQL3 was originally planned to be issued in about 1996...but things didn’t go as planned. As you may be aware, SQL3 has been characterize...

2016
Jason C. Cole Colin R. Groom Murray G. Read Ilenia Giangreco Patrick McCabe Anthony M. Reilly Gregory P. Shields

This analysis attempts to answer the question of whether similar molecules crystallize in a similar manner. An analysis of structures in the Cambridge Structural Database shows that the answer is yes - sometimes they do, particularly for single-component structures. However, one does need to define what we mean by similar in both cases. Building on this observation we then demonstrate how this ...

1984
T. R. Sahu

In this paper the author presents medicinal or otherwise useful weed species with details of family, vernacular name and its medicinal utility. Information on other general economic importance of medicinal weeds is also described here.

Journal: :Discrete Mathematics & Theoretical Computer Science 2013
Josef Slapal

In the classical approach to digital topology (see e.g. [12] and [13]), graph theoretic tools are used for structuring Z, namely the well-known binary relations of 4-adjacency and 8-adjacency. But neither 4adjacency nor 8-adjacency itself allows an analogue of the Jordan curve theorem (cf. [9]) and, therefore, one has to use a combination of the two adjacencies. To overcome this disadvantage, a...

2002
Atsuko Miyaji Masao Nonaka Yoshinori Takii

1996
M. J. Duff

Superunification underwent a major paradigm shift in 1984 when eleven-dimensional supergravity was knocked off its pedestal by ten-dimensional superstrings. This last year has witnessed a new shift of equal proportions: perturbative ten-dimensional superstrings have in their turn been superseded by a new non-perturbative theory called M-theory, which describes supermembranes and superfivebranes...

Journal: :Nucleic acids research 2000
Terri K. Attwood Michael D. R. Croning Darren R. Flower A. P. Lewis Jane E. Mabey Gilsenan Philip Scordis J. N. Selley W. Wright

The PRINTS database houses a collection of protein family fingerprints. These are groups of motifs that together are diagnostically more potent than single motifs by virtue of the biological context afforded by matching motif neighbours. Around 1200 fingerprints have now been created and stored in the database. The September 1999 release (version 24.0) encodes approximately 7200 motifs, coverin...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید