نتایج جستجو برای: chryseobacyerium indologenes

تعداد نتایج: 213  

2004
Eike Kiltz

We describe a practical identity-based encryption scheme that is secure in the standard model against chosen-ciphertext (IND-CCA2) attacks. Security is based on an assumption comparable to (but slightly stronger than) Bilinear Decisonal Diffie-Hellman (BDDH). A comparison shows that our construction outperforms all known identity-based encryption schemes in the standard model and its performanc...

2001
Tatsuaki Okamoto David Pointcheval

The last few months, several new results appeared about the OAEP construction , and namely the RSA{OAEP cryptosystem. Whereas OAEP was believed to provide the highest security level (IND-CCA2), with an eecient exact security level, the eeective security result had been showed to be incomplete. Nevertheless, the particular instantiation with RSA (which is anyway almost the sole application) had ...

Journal: :Acta virologica 2009
A Raja G Dhinakar Raj P Bhuvaneswari C Balachandran K Kumanan

Marek's disease virus (MDV) isolated from poultry flocks in three states of India was monitored for the virus occurrence in the field. The MDV genome was isolated from feather follicles, spleen, and liver of the chicken (173 samples). Twenty two samples were positive for MDV genome in PCR and belonged to the serotype 1. The sequencing of MEQ gene of 11 samples revealed that nucleotide sequences...

Journal: :Saudi pharmaceutical journal : SPJ : the official publication of the Saudi Pharmaceutical Society 2009
Mahmoud El-Badry Gihan Fetih Mohamed Fathy

The aim of this study was to prepare and characterize solid dispersions of water insoluble non-steroidal anti-inflammatory drug, indomethacin (IND), with polyethylene glycol 4000 (PEG4000) and Gelucire 50/13 (Gelu.) for enhancing the dissolution rate of the drug. The solid dispersions (SDs) were prepared by hot melting method at 1:1, 1:2 and 1:4 drug to polymer ratios. Scanning electron microsc...

2011
Li Bin

In order to resist the damage of digital text works in high BER networks or illegal copy in publication, we propose a robust feature-extracting algorithm based on threshold technology and then construct a new threshold birthmark algorithm. The information gain rate has been used to veraciously measure the importance of the feature in feature-extracting, and threshold(t,n) technology has also be...

2011
R. Dayanandan

Ethiopia has the largest livestock population in Africa but the contribution of this resource to the economy is limited and yet the country is in poverty. Dairy development has a big role for the contribution of income generation and employment. Demand for dairy products seems to exceed supply in the country in general and the study area in particular. Hence, the situation of dairy production a...

Journal: :International journal of systematic and evolutionary microbiology 2006
Chun-Ju Tai Hsiao-Ping Kuo Fwu-Ling Lee Han-Ken Chen Akira Yokota Chi-Chu Lo

Among a large collection of Taiwanese soil isolates, a novel Gram-negative, rod-shaped, non-spore-forming, yellow-pigmented bacterial strain, Soil-3-27(T), was isolated from farmland soil in Wu-Feng, Taiwan. The isolate was subjected to a polyphasic study including 16S rRNA gene sequencing, DNA-DNA hybridization, fatty acid analysis and comparative phenotypic characterization. The 16S rRNA gene...

2008
Xianhui Lu Xuejia Lai Dake He

Kurosawa and Desmedt proposed an efficient hybrid encryption scheme(KD04) which is secure against adaptive chosen ciphertext attacks(IND-CCA) although the underlying KEM(key encapsulation mechanism) is not IND-CCA secure[11]. We show a variant of KD04 which is IND-CCA secure when the the underlying DEM part is IND-CCA secure. We need a DEM built from one-time symmetric encryption scheme and a M...

2016
Jun Zhu Lin-Lin Chen Xian Zhu Ling Xie

Multi-receiver public key encryption is important in insecurity and open network environment and has been applied in many scenarios such as first pay television system, streaming media services and so on. To avoid costly management of certificate and settle the matter of key escrow, we combine multi-receiver public key encryption with certificateless cryptography, and then present the notion, s...

2004
Ivan Osipkov Yongdae Kim Jung Hee Cheon

In this paper, we formally define a notion of timed-release public key based authenticated encryption (TR-PKAE). In addition to standard time-independent security properties (such as IND-CCA security for confidentiality and ciphertext/plaintext unforgeability), TR-PKAE introduces requirements such as timed-release receiver confidentiality (IND-RTR-CCA), which precludes the receiver from decrypt...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید