Malicious Licorice

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Licking latency with licorice.

Numerous viruses cause latent infections in humans, and reactivation often results in pain and suffering. While vaccines for several of these viruses are available or currently being studied in clinical trials, and antiviral therapies have been successful in preventing or treating active infection, therapy to eradicate latent infection has lagged behind. A new study reported in this issue of th...

متن کامل

A Review on Licorice

Licorice (Glycyrrhizaglabra L) is an important herb used in almost all systems of medicine. The author tries to present in this article a comprehensive review on all aspects of Licorice.

متن کامل

The Pharmacological Activities of Licorice.

Licorice is one of the oldest and most frequently used herbs in traditional Chinese medicine. It contains more than 20 triterpenoids and 300 flavonoids. In recent years, a lot of studies have reported that the active compounds isolated from licorice possess antitumor, antimicrobial, antiviral, anti-inflammatory, immunoregulatory, and several other activities that contribute to the recovery and ...

متن کامل

Malicious Code *

Malicious code is as big of a problem today as it ever was, if not larger still. Software is becoming increasingly more complex, and many software systems themselves do not operate in isolation but rather are connected and in fact sometimes dependent on other systems. An attack on a software system therefore is a potential attack on any other system that it may interact with, which further magn...

متن کامل

Malicious Keccak

In this paper, we investigate Keccak — the cryptographic hash function adopted as the SHA-3 standard. We propose a malicious variant of the function, where new round constants are introduced. We show that for such the variant, collision and preimage attacks are possible. We also identify a class of weak keys for the malicious Keccak working in the MAC mode. Ideas presented in the paper were ver...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Circulation

سال: 2008

ISSN: 0009-7322,1524-4539

DOI: 10.1161/circulationaha.107.733097