نتایج جستجو برای: chryseobacterium indologenes
تعداد نتایج: 670 فیلتر نتایج به سال:
During 1997-2005, the microbiological quality and susceptibility of bacterial isolates of swimming pool waters were investigated. A total of 462 water samples were collected from three indoor swimming pools (a teaching pool, a competition public pool, a hydrotherapy pool) and two outdoor swimming pools (a hotel semi-public and a residential private pool) in Northwestern Greece. All water sample...
Circular security is an important notion for public-key encryption schemes and is needed by several cryptographic protocols. In circular security the adversary is given an extra “hint” consisting of a cycle of encryption of secret keys i.e., (Epk1(sk2), . . . , Epkn(sk1)). A natural question is whether every IND-CPA encryption scheme is also circular secure. It is trivial to see that this is no...
Privacy concerns in outsourced cloud databases have become more and more important recentlyand many efficient and scalable query processing methods over encrypted data have been proposed.However, there is very limited work on how to securely process top-k ranking queries over encrypteddatabases in the cloud. In this paper, we focus exactly on this problem: secure and efficient proce...
Two Gram-staining-negative bacterial strains, designated 3A10(T) and ECP37(T), were isolated from sediment samples collected from an industrially contaminated site in northern Portugal. These two organisms were rod-shaped, non-motile, aerobic, catalase- and oxidase-positive and formed yellow colonies. The predominant fatty acids were iso-C(15 : 0), anteiso-C(15 : 0), iso-C(17 : 1)omega9c and is...
Prêt à Voter is a supervised, end-to-end verifiable voting scheme. Informal analyses indicate that, subject to certain assumptions, Prêt à Voter is receipt free, i.e. a voter has no way to construct a proof to a coercer of how she voted. In this paper we propose a variant of Prêt à Voter and prove receipt freeness of this scheme using computational methods. Our proof shows that if there exists ...
Consider the provable security of RSA-OAEP when not instantiated with random oracles. Suppose a security reduction exists to show that finding a plaintext from a RSA-OAEP ciphertext (breaking the basic OW-CPA security) is as hard as the RSA problem. • The reduction can be used in an adaptive chosen ciphertext text (IND-CCA2) attack against RSA-OAEP. • The reduction cannot succeed in the random ...
Let X 1 ; X 2 ; : : : ; X n be n independent identically distributed real random variables and S n := n X i=1 X i. We obtain precise asymptotics for P(S n 2 n A) for rather arbitrary Borel sets A, in terms of the density of the dominating points in A. Our result extends classical theorems in the eld of large deviations for independent samples. We also obtain asymptotics for P(S n 2 n A), with n...
A taxonomic study was performed on strain R2A10-2(T), isolated from greenhouse soil cultivated with lettuce (Lactuca sativa L.), collected in Wanju Province, Korea. The bacterial cells were Gram-negative, aerobic, short rods. The growth temperature and pH were 5-35 degrees C and 5.0-9.0, respectively. Phylogenetic analysis based on 16S rRNA gene sequences revealed that this isolate had 93.3-97....
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید