نتایج جستجو برای: desynchronization attack
تعداد نتایج: 82948 فیلتر نتایج به سال:
certificateless public key cryptography (cl-pkc) is a useful method in order to solve the problems of traditional public key infrastructure (i. e. large amount of computation, storage and communication cost for managing certificates) and id-based public key cryptography (i. e. key escrow problem), simultaneously. a signcryption scheme is an important primitive in cryptographic protocols which p...
Patterns of sleep and wakefulness exhibited in an environment without time cues are generally considered to be monophasic, with a distinct relationship between sleep episodes and the minimum of body core temperature. In some cases this relationship between major sleep episodes and temperature becomes replaced by an apparently varying phase relationship between the two variables called "spontane...
Transcranial stimulation has become an established method in the evaluation of corticospinal tract function. Clinical studies mainly address slowing of conduction through measurement of increased central conduction time (CCT) and 'failures' of conduction through observation of marked reductions in the size of the motor evoked potential (MEP). While CCT is of great interest in detecting subclini...
Exposure to light at night (LAN) is associated with insomnia in humans. Light provides the main input to the master clock in the hypothalamic suprachiasmatic nucleus (SCN) that coordinates the sleep-wake cycle. We aimed to develop a rodent model for the effects of LAN on sleep. Therefore, we exposed male Wistar rats to either a 12 h light (150-200lux):12 h dark (LD) schedule or a 12 h light (15...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید