نتایج جستجو برای: regions were designated

تعداد نتایج: 3713491  

Journal: :Bioscience, biotechnology, and biochemistry 2007
Miho Kawahata Tsutomu Fujii Haruyuki Iefuji

We divided industrial yeast strains of Saccharomyces cerevisiae into three groups based on the sequences of their internal transcribed spacer (ITS) regions. One group contained sake yeasts, shochu yeasts, and one bakery yeast, another group contained wine yeasts, and the third group contained beer and whisky yeasts, including seven bakery yeasts. The three groups were distinguished by polymorph...

1996
Markus Jakobsson Kazue Sako Russell Impagliazzo

For many proofs of knowledge it is important that only the verifier designated by the confirmer can obtain any conviction of the correctness of the proof. A good example of such a situation is for undeniable signatures, where the confirmer of a signature wants t o make sure that only the intended verifier(s) in fact can be convinced about the validity or inva1idit)y of the signature. Generally,...

Journal: :IACR Cryptology ePrint Archive 2009
Qiong Huang Willy Susilo Duncan S. Wong

Designated verifier signature is a cryptographic primitive which allows a signer to convince a designated verifier of the validity of a statement but in the meanwhile prevents the verifier from transferring this conviction to any third party. In this work we present the first identity-based designated verifier signature scheme that supports non-delegatability, and prove its security in the rand...

Journal: :IACR Cryptology ePrint Archive 2011
Guilin Wang Fubiao Xia Yunlei Zhao

After the introduction of designated confirmer signatures (DCS) by Chaum in 1994, considerable researches have been done to build generic schemes from standard digital signatures and construct efficient concrete solutions. In DCS schemes, a signature cannot be verified without the help of either the signer or a semi-trusted third party, called the designated confirmer. If necessary, the confirm...

2012
Gergely Alpár Lejla Batina Wouter Lueks

Recent research has shown that using public-key cryptography for RFID tags is not only necessary in order to meet privacy requirements, but also now practically feasible. This has led to the development of new protocols like the Randomized Schnorr [6] identification. This protocol ensures that the identity of a tag only becomes known to the intended reader, and not to any eavesdropping party. I...

Journal: :Journal of nematology 1995
R T Robbins D J Brown

Lectotypes are designated for Longidorus sylphus, L. crassus, and L. fragilis from Thorne's original specimens. Amended descriptions, tables of morphological means, ranges and standard deviations, photographs of the anterior, vulval, and tail regions, and diagnoses and relationships are provided for each of the three species to aid identification and to better determine phylogenetic relationshi...

2012
Zhen-yong Keck Jinming Xia Yong Wang Wenyan Wang Thomas Krey Jannick Prentoe Thomas Carlsen Angela Ying-Jian Li Arvind H. Patel Stanley M. Lemon Jens Bukh Felix A. Rey Steven K. H. Foung

The majority of broadly neutralizing antibodies to hepatitis C virus (HCV) are against conformational epitopes on the E2 glycoprotein. Many of them recognize overlapping epitopes in a cluster, designated as antigenic domain B, that contains residues G530 and D535. To gain information on other regions that will be relevant for vaccine design, we employed yeast surface display of antibodies that ...

Journal: :Nucleic acids research 1992
M Naito Y Kohara Y Kurosawa

Using two primers corresponding to helix 1 and helix 3 regions in the homeodomain, we subjected genomic DNA from Caenorhabditis elegans to amplification by the polymerase chain reaction. Sequence analysis of the amplified products revealed a new homeobox-containing gene, designated ceh-19. This gene was located between lin-45 and unc-24 on chromosome IV where no homeogene has previously been ma...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید