نتایج جستجو برای: attack resistance

تعداد نتایج: 452323  

2011
Alessandro Barenghi Cédric Hocquet David Bol François-Xavier Standaert Francesco Regazzoni Israel Koren

The continuous scaling of VLSI technology and the aggressive use of low power strategies (such as subthreshold voltage) make it possible to implement standard cryptographic primitives within the very limited circuit and power budget of RFID devices. On the other hand, such cryptographic implementations raise concerns regarding their vulnerability to both active and passive side channel attacks....

Journal: :JCP 2012
Bo Meng Wei Wang Wei Chen

Owning to the damage of denial of service attacks in security protocols, resistance of denial of service attacks plays an important role in remote voting protocols. Recently Meng et al. proposed a secure remote internet voting protocol that claims to satisfy formal definitions of key properties without physical constrains. In this study firstly the review of the formal model of resistance of de...

2013
Christoph Vorburger Pravin Ganesanandamoorthy Marek Kwiatkowski

Host defenses against parasites do not come for free. The evolution of increased resistance can be constrained by constitutive costs associated with possessing defense mechanisms, and by induced costs of deploying them. These two types of costs are typically considered with respect to resistance as a genetically determined trait, but they may also apply to resistance provided by 'helpers' such ...

ژورنال: علوم آب و خاک 2007
عباس شریفی تهرانی, , عبدالحسین جمالی زواره, , مجتبی محمدی, ,

One of the properties of systemically acquired resistance in plants is their concomitance with the biochemical changes including enhancement of activities of defense-related enzymes. The leaf extract of Reynoutria sachalinensis (F. Schmidt) Nakai is known to be an effective compound for the control of a few plant diseases particularly powdery mildew of cucurbits (caused by fungal pathogen Podos...

عباس شریفی تهرانی, , عبدالحسین جمالی زواره, , مجتبی محمدی, ,

One of the properties of systemically acquired resistance in plants is their concomitance with the biochemical changes including enhancement of activities of defense-related enzymes. The leaf extract of Reynoutria sachalinensis (F. Schmidt) Nakai is known to be an effective compound for the control of a few plant diseases particularly powdery mildew of cucurbits (caused by fungal pathogen Podos...

Journal: :The Journal of Experimental Medicine 1990
T Shiohara N Moriya C Gotoh J Hayakawa M Nagashima K Saizawa H Ishikawa

The cutaneous graft-versus-host disease (GVHD) lesions induced by intradermal injection of cloned autoreactive T cells have been shown to subside rapidly and the epidermis returns to normal 2 wk after injection. Those mice that had spontaneously recovered from the cutaneous GVHD became resistant to subsequent attempts to induce the cutaneous GVHD by the T cells while maintaining their activity ...

Journal: :IACR Cryptology ePrint Archive 2009
Jinmin Zhong Xuejia Lai

DHA-256 (Double Hash Algorithm) was proposed at the Cryptographic Hash Workshop hosted by NIST in November 2005. DHA-256 is a dedicated hash function with output length of 256 bits and 64 steps of operations designed to enhance SHA-256 security. In this paper, we show two attacks on reduced DHA-256. The first attack finds one-block second preimage and preimage of 26-step DHA-256 with time compl...

Journal: :Plant signaling & behavior 2011
Yun-Soo Kim Soon Lim Hiroshi Yoda Yong-Eui Choi Hiroshi Sano

Caffeine functions in the chemical defense against biotic attackers in a few plant species, including coffee and tea. Transgenic tobacco plants that endogenously produced caffeine by expressing three N-methyltransferases involved in the caffeine biosynthesis pathway exhibited a strong resistance to pathogens and herbivores. Here we report that transgenic Chrysanthemum, which produced an equival...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید