نتایج جستجو برای: attack construction

تعداد نتایج: 287518  

Journal: :Bulletin of mathematical biology 2012
Sivan Leviyang

Cytotoxic T lymphocytes (CTLs) are immune system cells that are thought to play an important role in controlling HIV infection. We develop a stochastic ODE model of HIV-CTL interaction that extends current deterministic ODE models. Based on this stochastic model, we consider the effect of CTL attack on intrahost HIV lineages assuming that CTLs attack several epitopes with equal strength. In thi...

Journal: :acta medica iranica 0
massoud ghasemi research center of endovascular intervention, tehran, iran. maryam mehrpooya department of cardiology, imam khomeini hospital complex, tehran university of medical sciences, tehran, iran. and department of cardiology, school of medicine, tehran university of medical sciences, tehran, iran. farshad ghasemi mount sini hospital, university of toronto, toronto, canada. fatemeh shahbazi department of biology, payame noor university, tehran, iran.

our aim was to report techniques and our experience in one-stage angioplasty and stenting of ostium of left common carotid and left internal carotid arteries in an octogenarian man with transient ischemic attack, who was completely recovered from neurologic insults short time after the procedure. an 81-year-old man presented with a transient ischemic attack. neurologic examination showed left s...

2004
Mina Guirguis Azer Bestavros Ibrahim Matta

We expose an adversarial attack scheme that aims to steal bandwidth for the benefit of a particular set of flows through lunching a distributed interference attack streams on competing flows. The extent to which the interference attack streams were successful in reducing or denying bandwidth from competing flows determines the amount of bandwidth stolen. Given such a goal, our exposed scheme st...

Journal: :CoRR 2014
Shenghui Su Tao Xie Shuwang Lü

To examine the integrity and authenticity of an IP address efficiently and economically, this paper proposes a new non-Merkle-Damgård structural (non-MDS) hash function called JUNA that is based on a multivariate permutation problem and an anomalous subset product problem to which no subexponential time solutions are found so far. JUNA includes an initialization algorithm and a compression algo...

Journal: :IACR Cryptology ePrint Archive 2005
Praveen Gauravaram William Millan Juan Manuel González Nieto

The design principle of Merkle-Damg̊ard construction is collision resistance of the compression function implies collision resistance of the hash function. Recently multi-block collisions have been found on the hash functions MD5, SHA-0 and SHA-1 using differential cryptanalysis. These multi-block collisions raise several questions on some definitions and properties used in the hash function lit...

Journal: :IACR Cryptology ePrint Archive 2017
Steven Myers Adam Shull

We consider the problems of i) using public-key encryption to enforce dynamic access control on clouds; and ii) key rotation of data stored on clouds. Historically, proxy re-encryption, ciphertext delegation, and related technologies have been advocated as tools that allow for revocation and the ability to cryptographically enforce dynamic access control on the cloud, and more recently they hav...

Journal: :journal of occupational health and epidemiology 0
a esmaeili nadimi school of medicine, rafsanjan university of medical sciences, rafsanjan, iran m hasani rafsanjan university of medical sciences, rafsanjan, iran m allahtavakoli pharmacology-physiology research center, rafsanjan university of medical sciences, rafsanjan, iran e hakimizadeh pharmacology-physiology research center, rafsanjan university of medical sciences, rafsanjan, iran h bakhshi

background: the role of temperature changes, as an environmental risk factor, in the human health status has been investigated in recent studies. accordingly, the present two-year study was conducted to evaluate the incidence of myocardial infarction (mi) in warm and cold seasons in ali-ibn abi talib hospital, rafsanjan, iran. materials and methods: in this descriptive and cross-sectional study...

Journal: :IACR Cryptology ePrint Archive 2015
Mohammad Hassan Ameri Maryam Rajabzadeh Asaar Javad Mohajeri Mahmoud Salmasizadeh

Cloud data owners encrypt their documents before outsourcing to provide their privacy. They could determine a search control policy and delegate the ability of search token generation to the users whose attributes satisfy the search control policy. Verifiable attribute-based keyword search (VABKS) where the users can also verify the accuracy of cloud functionality is one of such schemes. In thi...

Journal: :J. Inf. Sci. Eng. 2008
Pin Lin Wenling Wu Chuankun Wu Tian Qiu

The most popular method to construct hash functions is to iterate a compression function on the input message. This method is called Merkle-Damgård method. Most hash functions used in practice such as MD4, MD5, SHA-0, SHA-1 are based on this method. However this method is not always the best. For example, this method can not resist multi-collision attack. Recently some modifications of this met...

Journal: :IACR Cryptology ePrint Archive 2007
Ueli Maurer Stefano Tessaro

A public random function is a random function that is accessible by all parties, in-cluding the adversary. For example, a (public) random oracle is a public random function{0, 1}∗ → {0, 1}. The natural problem of constructing a public random oracle from a pub-lic random function {0, 1} → {0, 1} (for some m > n) was first considered at Crypto 2005by Coron et al. who proved the se...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید