نتایج جستجو برای: attack resistance

تعداد نتایج: 452323  

Journal: :Evolution; international journal of organic evolution 1993
Steven A Frank

Hosts and parasites often have extensive genetic diversity for resistance and virulence (host range). Qualitative diversity occurs when the success of attack is an all-or-nothing response that varies according to the genotypes of the host and parasite. Quantitative diversity occurs when the success of attack is a graded response that depends on additive genetic variation in the host and parasit...

Journal: :journal of occupational health and epidemiology 0
a esmaeili nadimi school of medicine, rafsanjan university of medical sciences, rafsanjan, iran m hasani rafsanjan university of medical sciences, rafsanjan, iran m allahtavakoli pharmacology-physiology research center, rafsanjan university of medical sciences, rafsanjan, iran e hakimizadeh pharmacology-physiology research center, rafsanjan university of medical sciences, rafsanjan, iran h bakhshi

background: the role of temperature changes, as an environmental risk factor, in the human health status has been investigated in recent studies. accordingly, the present two-year study was conducted to evaluate the incidence of myocardial infarction (mi) in warm and cold seasons in ali-ibn abi talib hospital, rafsanjan, iran. materials and methods: in this descriptive and cross-sectional study...

Journal: :Current Biology 1999
David R. Smyth

Plants can become 'immune' to attack by viruses by degrading specific viral RNA, but some plant viruses have evolved the general capacity to suppress this resistance mechanism.

Journal: :IACR Cryptology ePrint Archive 2018
Laurent Castelnovi Ange Martinelli Thomas Prest

Because they require no assumption besides the preimage or collision resistance of hash functions, hash-based signatures are a unique and very attractive class of post-quantum primitives. Among them, the schemes of the sphincs family are arguably the most practical stateless schemes, and can be implemented on embedded devices such as FPGAs or smart cards. This naturally raises the question of t...

Journal: :journal of research in medical sciences 0
ozge basaran nermin uncu banu acar celikel fatma ayd?n nilgun cakar

background: blood neutrophil to lymphocyte ratio (nlr) and mean platelet volume (mpv) both have been used as a simple marker of inflammation in many disorders. here, we aimed to investigate the relationship between nlr, mpv, and familial mediterranean fever (fmf). materials and methods: in this retrospective study, the fi les of fmf patients in pediatric rheumatology outpatient clinic were revi...

2013
Neal Koblitz Alfred Menezes

We prove a security theorem without collision-resistance for a class of 1-key hash-function-based MAC schemes that includes HMAC and Envelope MAC. The proof has some advantages over earlier proofs: it is in the uniform model, it uses a weaker related-key assumption, and it covers a broad class of MACs in a single theorem. However, we also explain why our theorem is of doubtful value in assessin...

Journal: :Forests 2021

The discoloration and resistance to subterranean termite attack of four furfurylated fast-growing tropical wood species were evaluated after outdoor exposure for 1 year in Bogor, Indonesia. For comparison purposes, imidacloprid-preserved untreated samples also prepared. Discoloration all treated was measured before the furfurylation process. specimens then placed vertically three-fourths their ...

2009
Anne Canteaut María Naya-Plasencia

We present an internal collision attack against the new hash function Maraca which has been submitted to the SHA-3 competition. This attack requires 2 calls to the round function and its complexity is lower than the complexity of the generic collision attack when the length of the message digest is greater than or equal to 512. It is shown that this cryptanalysis mainly exploits some particular...

Journal: :Int. J. Communication Systems 2014
Chunguang Ma Ding Wang Sendong Zhao

Understanding security failures of cryptographic protocols is the key to both patching existing protocols and designing future schemes. In this paper, we analyze two recent proposals in the area of password-based remote user authentication using smart cards. First, we point out that the scheme of Chen et al. cannot achieve all the claimed security goals and report its following flaws: (i) it is...

2012
Ashwani Garg Vikas Beniwal

A Mobile Ad Hoc Network (MANET) is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any existing network infrastructure or centralized administration. There are a number of routing protocols developed by researchers. Due to the nature of ad hoc networks, secure routing is an important area of research in developing secure routing protocols. Althou...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید