نتایج جستجو برای: strand protocol
تعداد نتایج: 284992 فیلتر نتایج به سال:
In previous work, we introduced a version of distributed temporal logic that is well-suited both for verifying security protocols and as a metalogic for reasoning about, and relating, different security protocol models. In this paper, we formally investigate the relationship between our approach and strand spaces, which is one of the most successful and widespread formalisms for analyzing secur...
The biological materials available for cDNA microarray studies are often limiting. Thus, protocols have been developed to amplify RNAs isolated from limited amounts of tissues or cells. RNA amplification by in vitro transcription is the most widely used among the available amplification protocols. Two means of generating a dsDNA template for the RNA polymerase are a combination of reverse trans...
The adoption of the Dolev-Yao model, an abstraction of security protocols that supports symbolic reasoning, is responsible for many successes in protocol analysis. In particular, it has enabled using logic e ectively to reason about protocols. One recent framework for expressing the basic assumptions of the Dolev-Yao model is given by strand spaces, certain directed graphs whose structure re ec...
To the problem of many recently proposed RFID authentication protocol was soon find security holes, we analyzed the main reason, which is that protocol design is not rigorous, and the correctness of the protocol cannot be guaranteed. To this end, authentication test method was adopted in the process of the formal analysis and strict proof to the proposed RFID protocol in this paper. Authenticat...
The random priming DNA-labeling method of Feinberg and Vogelstein (1, 2) produces probes of high activities. However, incompletely denatured templates in the reaction mixture may cause problems. In addition, probes generated by the standard random priming method are not ideal for in situ hybridization or other methods requiring only one labeled strand. We have developed a method utilizing a bio...
In this paper, we introduce a mechanism that aims to speed up the development cycle of security protocols, by adding automated aid for diagnosis and repair. Our mechanism relies on existing verification tools analyzing intermediate protocols and synthesizing potential attacks if the protocol is flawed. The analysis of these attacks (including type flaw attacks) pinpoints the source of the failu...
Short peptides featuring a tetrahydropyridazinedione (tpd) backbone tether exhibit reduced conformational flexibility external to the heterocyclic constraint. Analysis by NMR, molecular modeling and X-ray crystallography suggests both covalent and non-covalent stabilization of extended peptide conformations. An efficient solid-phase protocol was developed for the synthesis of a new class of β-s...
background and aims. this study aimed to investigate release of nickel ion from three types of nickel-titanium-based wires in the as-received state and after immersion in a simulated oral environment. materials and methods. forty specimens from each of the single-strand niti (rematitan “lite”), multi-strand niti (speed supercable) and copper niti (damon copper niti) were selected. twenty specim...
UNLABELLED BACKGROUND High throughput DNA sequencing technology has enabled quantification of all the RNAs in a cell or tissue, a method widely known as RNA sequencing (RNA-Seq). However, non-coding RNAs such as rRNA are highly abundant and can consume >70% of sequencing reads. A common approach is to extract only polyadenylated mRNA; however, such approaches are blind to RNAs with short or ...
The comet analysis of DNA strand break levels in tissues and cells has become a common method of screening for genotoxicity. The large majority of published studies have used fresh tissues and cells processed immediately after collection. However, we have used frozen tissues and cells for more than 10 years, and we believe that freezing samples improve efficiency of the method. We compared DNA ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید