نتایج جستجو برای: attack resistance
تعداد نتایج: 452323 فیلتر نتایج به سال:
Hosts and parasites often have extensive genetic diversity for resistance and virulence (host range). Qualitative diversity occurs when the success of attack is an all-or-nothing response that varies according to the genotypes of the host and parasite. Quantitative diversity occurs when the success of attack is a graded response that depends on additive genetic variation in the host and parasit...
background: the role of temperature changes, as an environmental risk factor, in the human health status has been investigated in recent studies. accordingly, the present two-year study was conducted to evaluate the incidence of myocardial infarction (mi) in warm and cold seasons in ali-ibn abi talib hospital, rafsanjan, iran. materials and methods: in this descriptive and cross-sectional study...
Plants can become 'immune' to attack by viruses by degrading specific viral RNA, but some plant viruses have evolved the general capacity to suppress this resistance mechanism.
Because they require no assumption besides the preimage or collision resistance of hash functions, hash-based signatures are a unique and very attractive class of post-quantum primitives. Among them, the schemes of the sphincs family are arguably the most practical stateless schemes, and can be implemented on embedded devices such as FPGAs or smart cards. This naturally raises the question of t...
background: blood neutrophil to lymphocyte ratio (nlr) and mean platelet volume (mpv) both have been used as a simple marker of inflammation in many disorders. here, we aimed to investigate the relationship between nlr, mpv, and familial mediterranean fever (fmf). materials and methods: in this retrospective study, the fi les of fmf patients in pediatric rheumatology outpatient clinic were revi...
We prove a security theorem without collision-resistance for a class of 1-key hash-function-based MAC schemes that includes HMAC and Envelope MAC. The proof has some advantages over earlier proofs: it is in the uniform model, it uses a weaker related-key assumption, and it covers a broad class of MACs in a single theorem. However, we also explain why our theorem is of doubtful value in assessin...
The discoloration and resistance to subterranean termite attack of four furfurylated fast-growing tropical wood species were evaluated after outdoor exposure for 1 year in Bogor, Indonesia. For comparison purposes, imidacloprid-preserved untreated samples also prepared. Discoloration all treated was measured before the furfurylation process. specimens then placed vertically three-fourths their ...
We present an internal collision attack against the new hash function Maraca which has been submitted to the SHA-3 competition. This attack requires 2 calls to the round function and its complexity is lower than the complexity of the generic collision attack when the length of the message digest is greater than or equal to 512. It is shown that this cryptanalysis mainly exploits some particular...
Understanding security failures of cryptographic protocols is the key to both patching existing protocols and designing future schemes. In this paper, we analyze two recent proposals in the area of password-based remote user authentication using smart cards. First, we point out that the scheme of Chen et al. cannot achieve all the claimed security goals and report its following flaws: (i) it is...
A Mobile Ad Hoc Network (MANET) is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any existing network infrastructure or centralized administration. There are a number of routing protocols developed by researchers. Due to the nature of ad hoc networks, secure routing is an important area of research in developing secure routing protocols. Althou...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید