نتایج جستجو برای: strand protocol
تعداد نتایج: 284992 فیلتر نتایج به سال:
An alkaline elution procedure was used to study the nature of DNA damage induced by auromomycin, an antitumor protein, in human leukemic lymphoblasts (CCRF-CEM cells). The filter elu tion of drug-treated cells at pH 12.2 and 9.6 showed induction of both single and double strand DNA breaks. The DNA strand scission activities were linear in relation to drug concentration. The frequency of single ...
Several studies support that antisense-mediated regulation may affect a large proportion of genes. Using the Illumina next-generation sequencing platform, we developed DSSS (direct strand specific sequencing), a strand-specific protocol for transcriptome sequencing. We tested DSSS with RNA from two samples, prokaryotic (Mycoplasma pneumoniae) as well as eukaryotic (Mus musculus), and obtained d...
Some cryptographic protocols are vulnerable to replay attacks, a type of weakness that was a focus of attention in the Burroughs-Abadi-Needham logic. Newer, more operational approaches to protocol analysis have not concentrated on this type of attack. This paper fills the gap for the strand space theory. The main technical point is to provide a definition of recency. Our candidate is convenient...
We adapt the Strand Spaces model to reason abstractly about layered security protocols, where an Application Layer protocol is layered on top of a secure transport protocol. The model abstracts away from the implementation of the secure transport protocol and just captures the properties that it provides to the Application Layer. We illustrate the usefulness of the model by using it to verify a...
In security protocol analysis, it is important to learn general principles that limit the abilities of an attacker, and that can be applied repeatedly to a variety of protocols. We introduce the notion of an ideal—a set of messages closed under encryption and invariant under composition with arbitrary messages—to express such principles. In conjunction with the strand space formalism, we use th...
IEEE has designed 802.11i protocol to address the security issues in wireless local area networks. Formal analysis is important to ensure that the protocols work properly without having to resort to tedious testing and debugging which can only show the presence of errors, never their absence. In this paper, we present the formal verification of an abstract protocol model of 802.11i. We translat...
The 3rd generation partnership project (3GPP) has been enhancing the security of 5G AKA (authentication and key agreement) protocol. However, there may still be some shortcomings in latest version According to analysis protocol, this paper points out seven its shortcomings. To overcome these shortcomings, an improved primary authentication agreement protocol for networks is proposed, which name...
In this work we use our proposed adaptation of the strand spaces method in the analysis of a fair exchange protocol for payment, proposed in [Zuo and Li 2005]. The protocol fails to provide timeliness and fairness to the buyer (Downloader), and four previously unreported attacks are traced regarding those properties. This is a continuation of the work started in [Piva et al. 2006].
The analysis of transcriptome, which was over the past decade based mostly on microarray technologies, is now being superseded by so-called next generation sequencing (NGS) systems that changed the way to explore entire transcriptome. RNA sequencing (RNA-Seq), one application of NGS, is a powerful tool, providing information not only about the expression level of genes but also further about th...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید