نتایج جستجو برای: dlp

تعداد نتایج: 1132  

2004
In-Sok Lee Woo-Hwan Kim Daesung Kwon Sangil Nahm Nam-Seok Kwak Yoo-Jin Baek

For a finite group G to be used in the MOR public key cryptosystem, it is necessary that the discrete logarithm problem(DLP) over the inner automorphism group Inn(G) of G must be computationally hard to solve. In this paper, under the assumption that the special conjugacy problem of G is easy, we show that the complexity of the MOR system over G is about log |G| times larger than that of DLP ov...

Journal: :The Journal of biological chemistry 2004
Xiaojing Sun Hua Zhang Dan Wang Dalong Ma Yan Shen Yongfeng Shang

In eukaryotes, primary transcripts undergo a splicing process that removes intronic sequences by a macromolecular enzyme known as the spliceosome. Both genetic and biochemical studies have revealed that essential components of the spliceosome include five small RNAs, U1, U2, U4, U5, and U6, and as many as 300 distinct proteins. Here we report the molecular cloning and functional analysis of a n...

2006
Ming-Deh Huang Wayne Raskind

This is the third in a series of papers in which we develop a unified method for treating the discrete logarithm problem (DLP) in various contexts. In [HR1], we described a formalism using global duality for a unified approach to the DLP for the multiplicative group and for elliptic curves over finite fields. The main tool to be employed is what we call signature calculus. In [HR2], we used sig...

Journal: :iranian journal of radiation research 0
f. bouzarjomehri department of medical physics, shahid sadoghi university of medical sciences, yazd, iran m. h. zare department of medical physics, isfahan university of medical sciences, isfahan, iran d. shahbazi department of medical physics, isfahan university of medical sciences, isfahan, iran

abstract   background: while the benefits of computed tomography (ct) are well known in accurate diagnosis, those benefits are not risk free. ct is a device with higher patient dose in comparison with other conventional radiological procedures. is the reduction of exposures by requiring optimization of ct procedures [a principle concern in radiological protection]? in this study, the radiation ...

Journal: :IJSNet 2015
Kun Yuan Qing Ling Zhi Tian

This paper addresses the problem of decentralized event detection in a largescale wireless sensor network (WSN), where without the coordination of any fusion center, sensor nodes autonomously make decisions through information exchange with their neighbors. We formulate the event detection problem as a linear program, and propose a heuristic decentralized linear programming (DLP) approach to so...

1992
Anton Eliëns Erik P. de Vink

In this paper the semantics of the communication mechanism of the distributed logic programming language DLP is studied. DLP combines logic programming with object oriented features and parallelism. For an abstract subset of DLP both an operational and denotational semantics is given. The language DLP supports active objects, method call by rendezvous and moreover (distributed) backtracking ove...

Journal: :JCP 2011
R. Padmavathy Chakravarthy Bhagvati

Three-party authenticated key exchange protocol is an important cryptographic technique in the secure communication areas. Recently Chang and Chang proposed a novel three party simple key exchange protocol and claimed the protocol is secure, efficient and practical. Unless their claim, a key recovery attack is proposed on the above protocol by recovering the ephemeral keys. One way of recoverin...

2009
Markus Krötzsch Sebastian Rudolph

Description Logic Programs (DLP) have been described as a description logic (DL) that is in the “expressive intersection” of DL and datalog. This is a very weak guideline for defining DLP in a way that can be claimed to be optimal or maximal in any sense. Moreover, other DL fragments such as EL and Horn-SHIQ have also been “expressed” using datalog. Is DLP just one out of many equal DLs in this...

2000
Peter F. Patel-Schneider

DLP has undergone a number of modiications in the last year. Most of the modiications are further optimisations, but DLP now has an option to compute and return the full model it generates for satissable formulae. The new optimisations include some low-level optimisations, more cached information to help in backjumping, early investigation of modal successors , and a form of dynamic backtrackin...

2010

Data Loss/Leakage Prevention (DLP) has risen to prominence in recent years due to an increase in the number of data breach incidents [1]—including a string of high-profile incidents [2,3]—and because of the potential for massive losses due to these ($6.75 million dollars per data breach incident [12]). To address data breaches, many major players in the information security market have DLP prod...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید