نتایج جستجو برای: chou

تعداد نتایج: 1179  

Journal: :Physics Today 1994

2007
Jari Kyngäs

The Chou-Fasman method has been a widely used method for protein secondary structure prediction. This method is based on knowledge about amino acid residues potential to form αhelical regions or β-sheet regions in proteins. Our main interest in this study was to examine the reliability of these Chou-Fasman parameters. We have calculated the Chou-Fasman parameters, with 95% confidence limits, ou...

Journal: :Zootaxa 2013
Menglin Wang Yinglun Wang

The genus Loxocephala Schaum, 1850 is reviewed. Three new species: L. rugosa sp. nov., L. verticalis sp. nov. and L. mangkangensis sp. nov. are described from China. L., perpunctata Jacobi, 1944 and L. sinica Chou & Huang, 1985 are given supplementary descriptions. In addition, according to the male genitalia, L. sinica sichuanensis Chou & Huang, 1985 is upgraded to species level: L. sichuanens...

Journal: :T'oung Pao 1915

Journal: :Clinical Infectious Diseases 2018

Journal: :IACR Cryptology ePrint Archive 2017
Ziya Alper Genç Vincenzo Iovino Alfredo Rial

In 2015, Chou and Orlandi presented an oblivious transfer protocol that already drew a lot of attention both from theorists and practitioners due to its extreme simplicity and high efficiency. Chou and Orlandi claimed that their protocol is UC-secure in the random oracle model under dynamic corruptions, which is a very strong security guarantee. Unfortunately, in this work we point out a flaw i...

Journal: :IACR Cryptology ePrint Archive 2006
Thulasi Goriparthi Manik Lal Das Atul Negi Ashutosh Saxena

Recently Manik et al. [13] proposed a novel remote user authentication scheme using bilinear pairings. Chou et al. [14] identified a weakness in Manik et al.’s scheme and made an improvement. In this paper, we show that both Manik et al.’s and Chou et al.’s schemes are insecure against forgery attack and replay attack.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید