نتایج جستجو برای: phan
تعداد نتایج: 451 فیلتر نتایج به سال:
Citation for the original published paper (version of record): Schoultz, I., McKay, C., Graepel, R., Phan, V., Wang, A. et al. (2012) Indomethacin-induced translocation of bacteria across enteric epithelia is reactive oxygen species-dependent and reduced by vitamin C. American Journal of Physiology Gastrointestinal and Liver Physiology, 303(5): G536-G545 http://dx.doi.org/10.1152/ajpgi.00125.2012
Phan Chau Trinh (18721926) is one of the most typical reformist in Vietnam early twentieth century. The article analyzes his political views and concept national salvation he proposed. For a more complete objective disclosure role Chu Trinh, archival documents, mainly collected France, as well proceedings scientific seminars conferences recent years, were involved. In context Đoi moi reforms ca...
In this paper we apply impossible differential attacks to reduced round AES. Using various techniques, including the early abort approach and key schedule considerations, we significantly improve previously known attacks due to Bahrak-Aref and Phan. The improvement of these attacks leads to the best known impossible differential attacks on 7-round AES-128 and AES-192, as well as to the best kno...
A growing number of studies have examined the relationship between corporate governance and corporate entrepreneurship, with most finding that corporate governance has a significant influence (Zahra, 1996, Zahra et al., 2000b). However, the question of which ownership structure and governance mechanism most significantly drives corporate entrepreneurship in transitioning economies is still unde...
Richard M. EPAND*1, Phan VUONG†, Christopher M. YIP†, Shohei MAEKAWA‡ and Raquel F. EPAND* *Department of Biochemistry, McMaster University, Hamilton L8N 3Z5, ON, Canada, †Department of Chemical Engineering and Applied Chemistry, Institute of Biomaterials and Biomedical Engineering, University of Toronto, Toronto M5S 3G9, ON, Canada, and ‡Department of Bioinformation, Department of Life Science...
The hash algorithm BLAKE, one of the SHA-3 finalists, was designed by Aumasson, Henzen, Meier, and Phan. Unlike other SHA-3 finalists, there is no known indifferentiable security proof on BLAKE. In this paper, we provide the indifferentiable security proof on BLAKE with the bound O( σ 2 2n−3 ), where σ is the total number of blocks of queries, and n is the hash output size.
Tien Manh Huynh, Quang Dinh Le, Mai Ngoc Luu, Tram Thi Huyen Nguyen, Quy Nhuan Bui, Anh Phan Tuong Mai, Thang Hiep Duc Tran, Hien Minh Cong Hong Vo, and Trong Quach. Int J Gastrointest Interv 2022;11:135-8. https://doi.org/10.18528/ijgii220007
radio frequency identification (rfid) applications have spread all over the world. in order to provide their security and privacy, researchers proposed different kinds of protocols. in this paper, we analyze the privacy of a new protocol, proposed by yu-jehn in 2015 which is based on electronic product code class1 generation 2 (epc c1 g2) standard. by applying the ouafi_phan privacy model, we s...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید