نتایج جستجو برای: according ti his signature

تعداد نتایج: 693040  

Journal: :Carcinogenesis 1998
N J Walker F G Crofts Y Li S F Lax C L Hayes P T Strickland G W Lucier T R Sutter

Knowledge of the response of cytochrome P450 1B1 (CYP1B1) to exposure to 2,3,7,8-tetrachlorodibenzo-p-dioxin (TCDD) in both humans and rodents is limited. To improve the analysis of CYP1 proteins, specific CYP1B1 and CYP1A1 polypeptides were expressed as hexahistidine-tagged fusion proteins in Escherichia coli, purified to homogeneity and used to produce polyclonal antibodies in rabbits. Immuno...

Journal: :Molecular & cellular proteomics : MCP 2006
Christian Tagwerker Karin Flick Meng Cui Cortnie Guerrero Yimeng Dou Bernhard Auer Pierre Baldi Lan Huang Peter Kaiser

Tandem affinity strategies reach exceptional protein purification grades and have considerably improved the outcome of mass spectrometry-based proteomic experiments. However, current tandem affinity tags are incompatible with two-step purification under fully denaturing conditions. Such stringent purification conditions are desirable for mass spectrometric analyses of protein modifications as t...

M. Nadjakhah Z. Pahlevani Tehrani

This article concerned on the study of signature submanifolds for curves under Lie group actions SE(2), SA(2) and for surfaces under SE(3). Signature submanifold is a regular submanifold which its coordinate components are differential invariants of an associated manifold under Lie group action, and therefore signature submanifold is a key for solving equivalence problems.

2002
Zuowen Tan Zhuojun Liu Chunming Tang

In a proxy signature scheme, a potential signer delegates his signing power to a proxy, who signs a message on behalf of the original signer. In a blind signature scheme, the signee cannot link the relationship between the blind message and the signature of the chosen message. That is, the signee cannot make a linkage between the blind signature and the identity of the requester. Therefore, it ...

2007
Young-Seol Kim Jik Hyun Chang

The proxy signature scheme is a kind of digital signature scheme. In the proxy signature scheme, one user, called the original signer, can delegate his/her signing capability to another user called the proxy signer. This is similar to a person delegating his/her seal to another person in the real world. In this paper, we propose a new type of proxy signature scheme, the self proxy signature sch...

Journal: :Applied Mathematics and Computation 2003
Fangguo Zhang Reihaneh Safavi-Naini Willy Susilo

At the fourth ACM conference on electronic commerce (EC’03), S. Han, K.Y. Yeung and J. Wang proposed an ID-based confirmer signature scheme using pairings (actually, this is an ID-based undeniable signature scheme). However, in this paper, we will show that this signature scheme is not secure. The signer can deny any signature, even this signature is his valid signature and any one can forge a ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - پژوهشکده علوم زمین سازمان زمین شناسی و اکتشافات مع 1390

the neogene intrusion masses in the noudeh-enghelab area located to the north of sabzevar ophiolite have cut the late cretaceous ophiolitic rocks, sedimentary- volcanic and eocene volcanic rocks and have been covered by pliocene and quaternary deposits. the margin is of lava with basalt, phyric andesite-basalt and andesite and the central parts (dome shaped) composed of phyric andesite-trachyan...

2003
Yan Xie Fangguo Zhang Xiaofeng Chen Kwangjo Kim

The advantage of ID-based system is the simplification of key distribution and certification management; a user can directly use his identity as his public key instead of an arbitrary number, thus at the same time he can prove his identity rather than providing a certificate from CA. Now a revocable blind signature is becoming more practical; because a complete anonymity can be abused in real w...

Journal: :Informatica, Lith. Acad. Sci. 2000
Min-Shiang Hwang Iuon-Chang Lin Kuo-Feng Hwang

Recently, Harn proposed an efficient scheme that can batch verification multiple RSA digital signatures. His scheme can reduce signature verification time. However, there is a weakness in his scheme. In this study, we present two methods to against his scheme.

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شهید مدنی آذربایجان - دانشکده ادبیات و علوم انسانی 1392

when we return to the concept of poetry and the age-old discussion about the uselessness or the usefulness of the poets to the private and public state of human beings, originating from plato and aristotles views about poets respectively, there emerges the question of the role of poetry in human beings lives. in the same manner, with the advance of technology and the daily progress and improvem...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید