نتایج جستجو برای: yung

تعداد نتایج: 546  

2009
Jeroen van de Graaf

In this note we simplify the Cramer, Franklin, Schoenmaker and Yung internet voting protocol to the booth setting. In it, objects of the form g 0g x1 1 · · · g xl l (mod q) are used to define an unconditionally hiding commitment scheme. Because of their homomorphic properties they are particularly suited for voting protocols with unconditional privacy. In fact, we show that almost all existing ...

2001
J. NÉMETH M. Pavlovic

The inequalities of Hardy–Littlewood type play very important role in many theorems concerning convergence or summability of orthogonal series. In the applications many times their converses are also very useful. Both the original inequalities and their converses have been generalized in several directions by many authors, among others Leindler (see [5], [6], [7], [8]), Mulholland (see [10]), C...

Journal: :Annals of the Academy of Medicine, Singapore 2016
Chee Fu Yung Chia Yin Chong Kee Thai Yeo Christina Liew Lee Ching Ng Natalie Wh Tan George Sh Yeo Nancy Ws Tee Raymond Tp Lin Thiam Chye Tan Victor S Rajadurai Jerry Ky Chan Koh Cheng Thoon

Annals Academy of Medicine Zika Virus: An Evolving Public Health Threat Chee Fu Yung, 1MBChB, MSt (Camb), FFPH, Chia Yin Chong, 1MBBS, M. Med, FRCPCH, Kee Thai Yeo, 2MD MS FAAP, Christina Liew, 3MSc, PhD, Lee Ching Ng, 3,4PhD, Natalie WH Tan, 1MBBS, MRCPCH, FAMS, George SH Yeo, 5MBBS (Singapore), FRCOG (Lon), FAMS (Singapore), Nancy WS Tee,6 MBBS, FRCPA, Raymond TP Lin, 7MBBS, FRCPA, Thiam Chye...

2012
Eric Filiol

Malicious cryptology and malicious mathematics is an emerging domain initiated in Filiol & Josse (2007); Filiol & Raynal (2008;b). It draws its inspiration from crypto virology Young & Yung (2004). However this latter domain has a very limited approach of how cryptography can be perverted by malware. Indeed, their authors consider the case of extortion malware in which asymmetric cryptography i...

2010
Paschalis Tsiaflakis Yung Yi Mung Chiang Marc Moonen

Paschalis Tsiaflakis, Yung Yi, Mung Chiang, Marc Moonen ∗ Electrical Engineering, ESAT/SCD, Katholieke Universiteit Leuven Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium Phone: +32 (0)16 32 18 03, Fax: +32 (0)16 32 19 70, Email:{paschalis.tsiaflakis,marc.moonen}@esat.kuleuven.be † Electrical Engineering, KAIST Building E3 (Information and Electronics Bldg), 6-3205, South Korea Phone: ...

Journal: :Molecular pharmacology 1971
J M Trifaró J Dworkind

HERBERT SHEPPARD AND CHARLES II. BURGHARDT. The Effect of Alpha, Bela, and Dopamine Receptor-Blocking Agents oii the Stimulation of Rat Eryt hrocyte Adenyl Cyclase by Dihydroxyphenethylamines and Their -Hydroxylated Derivatives 1 0. A. SHE IIsA AND L. A. FAHIEN. Modifications of Glutamate Dehydrogenase by Various Drugs Which Affect Behavior S 1 ENNETH C. LEIBMAN AND RONALD W. ESTABROOK. Effects...

2002
LISA BOMGAARS MARC C. CHAMBERLAIN DAVID G. POPLACK SUSAN M. BLANEY

1. Carcinomatous meningitis (metastases caused by carcinoma such as lung and breast) 2. Meningeal gliomatosis (dissemination of CSF caused by malignant glial tumors) 3. Leptomeningeal metastases secondary to other underlying solid tumors (e.g., rhabdomyosarcoma, neuroblastoma, medulloblastoma, other primitive neuroectodermal tumors) 4. Lymphomatous meningitis (metastases caused by lymphoma) 5. ...

Journal: :Thrombosis and haemostasis 2014
W-S Chung C-L Lin Y-F Chen W-H Hsu C-H Kao

Wei-Sheng Chung1,2,3; Cheng-Li Lin4; Yung-Fu Chen3; Wu-Huei Hsu2; Chia-Hung Kao2,5* 1Department of Internal Medicine, Taichung Hospital, Ministry of Health and Welfare, Executive Yuan, Taichung, Taiwan; 2Graduate Institute of Clinical Medical Science and School of Medicine, College of Medicine, China Medical University, Taichung, Taiwan; 3Department of Healthcare Administration, Central Taiwan ...

Journal: :Computer Networks 2014
Hanjin Park Yung Yi Yongdae Kim

http://dx.doi.org/10.1016/j.comnet.2014.09.009 1389-1286/ 2014 Elsevier B.V. All rights reserved. ⇑ Corresponding author. Tel.: +82 42 350 3486. E-mail addresses: [email protected] (H. Park), yiyung@kaist. edu (Y. Yi), [email protected] (Y. Kim). 1 Being malicious or selfish just follows a fabricator’s inte cheating. However, it is possible that a selfish user’s behavio indirectly ma...

2011
Shin-Hyoung Park Jung-In Kim Yong Kee Jeong Yung Hyun Choi

Shin-Hyoung Park, Jung-In Kim, Yong Kee Jeong and Yung Hyun Choi* Department of Pathology, Department of Biochemistry, College of Oriental Medicine and Research Institute of Oriental Medicine, Department of Biomaterial Control, Graduate School and Blue-Bio Industry Regional Innovation Center, Dongeui University, Busan 614-714, Korea School of Food and Life Science, College of Biomedical Science...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید