On Polybius xxi. 5. 6

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Bile Acids XXI. METABOLISM OF 3a,6~-DIHYDROXY-5~-CHOLANOIC ACID-24-‘4C-6a-“H IN THE RAT*

Our previous communication (2) reported the metabolism of lithocholic acid-24-W in the rat and the identification of chenodeoxycholic acid, 30(, 6/3-dihydroxy-5@-cholanoic acid, cy-muricholic acid, and P-muricholic acid as metabolites in the bile. Since previous studies (3) have shown that chenodeoxycholic acid is metabolized to QIand P-muricholic acids in the rat, chenodeoxycholic acid is prob...

متن کامل

Polybius: Secure Web Single-Sign-On for Legacy Applications

Web-based interfaces to applications in all domains of university life are surging. Given the diverse demands in and the histories of universities, combined with the rapid IT industry developments, all attempts at a sole all-encompassing platform for single-sign-on (SSO) will remain futile. In this paper, we present an architecture for a meta-SSO, which is able to seamlessly integrate with a wi...

متن کامل

Xxi. Neurology

2. Transient Probability Distributions of Nerve Impulse Intervals, S. B. Thesis, Department of Physics, M.I. T., June 1964. The time evolution of the distribution of nerve-impulse intervals was examined by measuring histograms at varying times in the stimulus cycle. The distribution width was found to vary inversely as the stimulus strength. There is an indication that the width also depends up...

متن کامل

An Extended Version of the Polybius Cipher

This paper provides a security method which can be used for data that contains alphabets, numerals and some special symbols during their transmission. A discussion about cryptology and the existing Polybius cipher is made. The existing Polybius cipher is based on the use of a 5X5 matrix of letters constructed using numbers from 1 to 5. This square can allow the text that contains alphabets only...

متن کامل

Development of Modified Polybius Technique for Data Security

In present scenario sharing of information is increasing significantly. The information is being transmitted to different user and undergoes various passive and active attacks; therefore, the information security plays a challenging role in communication. Cryptography plays a vital role in secure wireless communication and provides an excellent solution to offer the necessary protection against...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Classical Philology

سال: 1920

ISSN: 0009-837X,1546-072X

DOI: 10.1086/360295