نتایج جستجو برای: sensitive synthetic schemes side

تعداد نتایج: 715793  

Journal: :The journal of physical chemistry. B 2015
David Punihaole Zhenmin Hong Ryan S Jakubek Elizabeth M Dahlburg Steven Geib Sanford A Asher

We identified vibrational spectral marker bands that sensitively report on the side chain structures of glutamine (Gln) and asparagine (Asn). Density functional theory (DFT) calculations indicate that the Amide III(P) (AmIII(P)) vibrations of Gln and Asn depend cosinusoidally on their side chain OCCC dihedral angles (the χ3 and χ2 angles of Gln and Asn, respectively). We use UV resonance Raman ...

2009
Yumeto Kurahashi Akihiro Terashima Shigeo Takumi

The wild wheat Aegilops tauschii Coss. has extensive natural variation available for breeding of common wheat. Drought stress tolerance is closely related to abscisic acid (ABA) sensitivity. In this study, 17 synthetic hexaploid wheat lines, produced by crossing the tetraploid wheat cultivar Langdon with 17 accessions of Ae. tauschii, were used for comparative analysis of natural variation in d...

Secret sharing schemes perform an important role in protecting se-cret by sharing it among multiple participants. In 1979, (t; n) threshold secret sharing schemes were proposed by Shamir and Blakley independently. In a (t; n) threshold secret sharing scheme a secret can be shared among n partic-ipants such that t or more participants can reconstruct the secret, but it can not be reconstructed b...

Journal: :IACR Trans. Symmetric Cryptol. 2017
Christoph Dobraunig Maria Eichlseder Stefan Mangard Florian Mendel Thomas Unterluggauer

Side-channel attacks and in particular differential power analysis (DPA) attacks pose a serious threat to cryptographic implementations. One approach to counteract such attacks are cryptographic schemes based on fresh re-keying. In settings of pre-shared secret keys, such schemes render DPA attacks infeasible by deriving session keys and by ensuring that the attacker cannot collect side-channel...

2011
Sergio Firmenich Marco Winckler Gustavo Rossi Silvia E. Gordillo

Currently the Web is a platform for performing complex tasks which involve dealing with different Web applications. However, users still have to face these tasks in a handcrafted way. While building “opportunistic” servicebased software, such as mashups, can be a solution for combining data and information from different providers, many times this approach might have limitations. In this paper ...

Journal: :IACR Cryptology ePrint Archive 2016
Christoph Dobraunig Maria Eichlseder Stefan Mangard Florian Mendel Thomas Unterluggauer

Side-channel attacks and in particular differential power analysis (DPA) attacks pose a serious threat to cryptographic implementations. One approach to counteract such attacks are cryptographic schemes based on fresh re-keying. In settings of pre-shared secret keys, such schemes render DPA infeasible by deriving session keys and by ensuring that the attacker cannot collect side-channel leakage...

Journal: :CoRR 2014
Michael Kläs Jens Heidrich Jürgen Münch Adam Trendowicz

Managing quality (such as service availability or process adherence) during the development, operation, and maintenance of software(-intensive) systems and services is a challenging task. Although many organizations need to define, control, measure, and improve various quality aspects of their development artifacts and processes, nearly no guidance is available on how to select, adapt, define, ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید