نتایج جستجو برای: attack resistance
تعداد نتایج: 452323 فیلتر نتایج به سال:
The continuous scaling of VLSI technology and the aggressive use of low power strategies (such as subthreshold voltage) make it possible to implement standard cryptographic primitives within the very limited circuit and power budget of RFID devices. On the other hand, such cryptographic implementations raise concerns regarding their vulnerability to both active and passive side channel attacks....
Owning to the damage of denial of service attacks in security protocols, resistance of denial of service attacks plays an important role in remote voting protocols. Recently Meng et al. proposed a secure remote internet voting protocol that claims to satisfy formal definitions of key properties without physical constrains. In this study firstly the review of the formal model of resistance of de...
Host defenses against parasites do not come for free. The evolution of increased resistance can be constrained by constitutive costs associated with possessing defense mechanisms, and by induced costs of deploying them. These two types of costs are typically considered with respect to resistance as a genetically determined trait, but they may also apply to resistance provided by 'helpers' such ...
One of the properties of systemically acquired resistance in plants is their concomitance with the biochemical changes including enhancement of activities of defense-related enzymes. The leaf extract of Reynoutria sachalinensis (F. Schmidt) Nakai is known to be an effective compound for the control of a few plant diseases particularly powdery mildew of cucurbits (caused by fungal pathogen Podos...
One of the properties of systemically acquired resistance in plants is their concomitance with the biochemical changes including enhancement of activities of defense-related enzymes. The leaf extract of Reynoutria sachalinensis (F. Schmidt) Nakai is known to be an effective compound for the control of a few plant diseases particularly powdery mildew of cucurbits (caused by fungal pathogen Podos...
The cutaneous graft-versus-host disease (GVHD) lesions induced by intradermal injection of cloned autoreactive T cells have been shown to subside rapidly and the epidermis returns to normal 2 wk after injection. Those mice that had spontaneously recovered from the cutaneous GVHD became resistant to subsequent attempts to induce the cutaneous GVHD by the T cells while maintaining their activity ...
DHA-256 (Double Hash Algorithm) was proposed at the Cryptographic Hash Workshop hosted by NIST in November 2005. DHA-256 is a dedicated hash function with output length of 256 bits and 64 steps of operations designed to enhance SHA-256 security. In this paper, we show two attacks on reduced DHA-256. The first attack finds one-block second preimage and preimage of 26-step DHA-256 with time compl...
Caffeine functions in the chemical defense against biotic attackers in a few plant species, including coffee and tea. Transgenic tobacco plants that endogenously produced caffeine by expressing three N-methyltransferases involved in the caffeine biosynthesis pathway exhibited a strong resistance to pathogens and herbivores. Here we report that transgenic Chrysanthemum, which produced an equival...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید