نتایج جستجو برای: aka

تعداد نتایج: 1885  

Journal: :Proceedings on Privacy Enhancing Technologies 2019

2014
Minha Park Okyeon Yi

There are various services using mobile devices due to development of communication technology and mobile equipment, regardless of time and place. To secure usage of convenience and smart services, authentication between users’ devices and network is necessary. To achieve this, many researches have been studied about 3 rd Generation Partnership Project Authentication and Key Agreement (3GPP-AKA...

2010
Nicole Hess Courtney Helfrecht Edward Hagen Aaron Sell Barry Hewlett

Sex differences in physical and indirect aggression have been found in many societies but, to our knowledge, have not been studied in a population of hunter-gatherers. Among Aka foragers of the Central African Republic we tested whether males physically aggressed more than females, and whether females indirectly aggressed more than males, as has been seen in other societies. We also tested pred...

Journal: :Annals of vascular surgery 2000
A Kazmers A J Perkins L A Jacobs

Our objective was to assess outcomes for 8696 patients who underwent 9236 above- (AKA) and/or below-knee (BKA) amputations during a 4-year period for disorders of the circulatory system. Veterans Affairs (VA) Patient Treatment File (PTF) data were acquired for all patients in Diagnosis Related Groups (DRGs) 113 and 114 hospitalized in VA medical centers (VAMCs) during fiscal years 1991-1994. Da...

Journal: :Angewandte Chemie 2023

Graphical Abstract “Science is fun because it can take us one step closer to understanding the world … My favorite musician Alecia Beth Moore (aka Pink) …” Find out more about Nana Wang in her Introducing Profile.

2003

According to [1] Sect 8.1.1, the encryption key CK ESP shall be obtained from the key CK IM established as a result of the AKA procedure, using a suitable key expansion function, the latter to be specified in Annex I. Below, we study two alternatives for key expansion functions meeting the above length requirements and their security properties. We first note that the key CK IM is 128 bits in l...

2012
Yueming Deng Guojun Wang Jiannong Cao

3G-WLAN interworking is an emerging technology for the convergence of heterogeneous wireless networks. Solutions to unified authentication using Universal Subscriber Identity Module (USIM) card are urgent demands for wireless network operators, wireless service providers, and mobile users. However, it is a challenging issue to achieve unified authentication based on current network infrastructu...

Journal: :Human nature 2005
Courtney L Meehan

In this paper I examine the intracultural variability of parental and alloparental caregiving among the Aka foragers of the Central African Republic. It has been suggested that maternal kin offer higher frequencies of allocare than paternal kin and that maternal investment in infants will decrease when alloparental assistance is provided. Behavioral observations were conducted on 15 eight- to t...

2015
Wei Wang Laura J. Marholz Xiang Wang

Jumonji C domain-containing histone demethylases (JHDMs) are epigenetic proteins capable of demethylating methylated lysine residues on histones proteins and for which high-quality chemical probes and eventual therapeutic leads are highly desirable. To expand the extent of known scaffolds targeting JHDMs, we initiated an unbiased high-throughput screening approach using a fluorescence polarizat...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید