نتایج جستجو برای: macs

تعداد نتایج: 1480  

Journal: :International Journal of Epidemiology 2016

Journal: :Journal of medical genetics 1993
Y L Zheng N P Carter C M Price S M Colman P J Milton G A Hackett M F Greaves M A Ferguson-Smith

Fetal nucleated cells in the maternal circulation constitute a potential source of cells for the non-invasive prenatal diagnosis of fetal genetic abnormalities. We have investigated the use of the Magnetic Activated Cell Sorter (MACS) for enriching fetal nucleated erythrocytes. Mouse monoclonal antibodies specific for CD45 and CD32 were used to deplete leucocytes from maternal blood using MACS ...

2012
M. Limousin H. Ebeling J. Richard A. M. Swinbank G. P. Smith M. Jauzac S. Rodionov

We present results of a strong-lensing analysis of MACS J0717.5+3745 (hereafter MACS J0717), an extremely X-ray luminous galaxy cluster at z = 0.55. Observations at different wavelengths reveal a complex and dynamically very active cluster, whose core is connected to a large scale filament extended over several Mpc. Using multi-passband imaging data obtained with the Hubble Space Telescope’s Ad...

Journal: :Fertility and sterility 2004
Uwe Paasch Sonja Grunewald Ashok Agarwal Hans-Jürgen Glandera

OBJECTIVE We investigated the activation of caspases 8, 9, 1, and 3 in human ejaculated spermatozoa to study main pathways of apoptosis. Potential functional impact of this phenomenon and possible activation mechanisms were examined by [1] subjecting cells to freezing and thawing, and [2] testing the dependence of caspase activity on membrane integrity. DESIGN Experimental study. SETTING An...

2002
Kenneth L. Calvert Srinivasan Venkatraman Jim Griffioen

Enhanced network services often involve allocating resources (bandwidth/buffer space) preferentially to packets belonging to certain flows or traffic classes. Such services are vulnerable to denial-of-service attacks if packet classification is based on information that can be forged, such as source and destination addresses and port numbers. Traditional message authentication codes (MACs), oft...

2016
Yan Xu Jianhui Xie Ronghua Chen Yu Cao Yuan Ping Qingwen Xu Wei Hu Dan Wu Lihua Gu Huaigu Zhou Xin Chen Ziqin Zhao Jiang Zhong Rui Li

No effective method has been developed to distinguish sperm cells originating from different men in multi-suspect sexual assault cases. Here we combined MACS and FACS to isolate single donor sperm cells from forensic mixture samples including female vaginal epithelial cells and sperm cells from multiple contributors. Sperms from vaginal swab were isolated by MACS using FITC-conjugated A kinase ...

2010
Mirjam van Eck

J Rehabil Med 42 © 2010 The Authors. doi: 10.2340/16501977-0543 Journal Compilation © 2010 Foundation of Rehabilitation Information. ISSN 1650-1977 Objective: To describe the manual ability of adolescents with cerebral palsy and to investigate the relationship of manual ability with daily activities. Design: Cross-sectional study. Subjects: Ninety-four adolescents with cerebral palsy, aged 12–1...

2000
Michael Semanko

In order to avoid birthday attacks on message authentication schemes, it has been suggested that one add randomness to the scheme. One must be careful about how randomness is added, however. This paper shows that prefixing randomness to a message before running the message through an iterated MAC leads to an attack that takes only O ( 2 +max{2l/2, 2r/2} ) queries to break, where l is the size o...

2013
Dario Catalano Dario Fiore

Homomorphic message authenticators allow the holder of a (public) evaluation key to perform computations over previously authenticated data, in such a way that the produced tag σ can be used to certify the authenticity of the computation. More precisely, a user knowing the secret key sk used to authenticate the original data, can verify that σ authenticates the correct output of the computation...

2013
Gaëtan Leurent Thomas Peyrin Lei Wang

In this paper we study the security of hash-based MAC algorithms (such as HMAC and NMAC) above the birthday bound. Up to the birthday bound, HMAC and NMAC are proven to be secure under reasonable assumptions on the hash function. On the other hand, if an n-bit MAC is built from a hash function with a l-bit state (l ≥ n), there is a well-known existential forgery attack with complexity 2. Howeve...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید