نتایج جستجو برای: nine weaknesses

تعداد نتایج: 221784  

Journal: :IACR Cryptology ePrint Archive 2008
Prasanth Kumar Thandra S. A. V. Satya Murty R. Balasubramanian

Synchronous stream cipher HENKOS is proposed by Marius Oliver Gheorghit to eprint for analyzing the algorithm by cryptologic community. At the first look of HENKOS, it can be observed that a 256 byte secret key is an undesirable quality of the algorithm. Also, the algorithm is not efficient in case of streaming data that has to encrypt instantaneously, this is because the algorithm generates a ...

2011
Kenneth Radke Colin Boyd Juan Manuel González Nieto Margot Brereton

We investigate known security flaws in the context of security ceremonies to gain an understanding of the ceremony analysis process. The term security ceremonies is used to describe a system of protocols and humans which interact for a specific purpose. Security ceremonies and ceremony analysis is an area of research in its infancy, and we explore the basic principles involved to better underst...

2001
William O’Donohue Jeffrey A. Buchanan

Platt’s 1964 paper “Strong Inference” (SI), published in Science, has had considerable influence upon the conception of the nature of the scientific method held in both the social and physical sciences. Platt suggests that a four-step method of specifying hypotheses and conducting critical experiments that systematically eliminate alternatives has been responsible for progress in the history of...

2010
Nicole Palan

This paper compares nine common specialization indices, discussing their properties, strengths and weaknesses. In order to unravel the differences between the indices they are applied to European employment structures in 2005, spanning 51 industries and 24 European countries. The resulting heterogeneity levels differ largely between relative and absolute specialization measures, but also within...

Journal: :Proteins 1997
C Bystroff D Baker

Blind predictions of the local structure of nine CASP2 targets were made using the I-sites library of short sequence--structure motifs, revealing strengths and weaknesses in this new knowledge-based method. Many turns between secondary structural elements were accurately predicted. Estimates of the confidence of prediction correlated well with the accuracy over the whole set. Bias toward struct...

2012
Mauricio Solar Gastón Concha Luis Meijueiro

In this article a maturity model is proposed, named OD-MM (Open Data Maturity Model) to assess the commitment and capabilities of public agencies in pursuing the principles and practices of open data. The OD-MM model has a three level hierarchical structure, called domains, sub-domains and critical variables. Four capacity levels are defined for each of the 33 critical variables distributed in ...

Akbarin, H, Bokaie, S, Fallah Mehrabadi , MH, Rabiee, MH, Sadrzadeh, A, Tehrani, F,

Background and Objectives: The commercial layer chicken farming is one of the most important sectors of the poultry industry. This study was conducted to evaluate the status of biosecurity of commercial layer chicken farms in 9 Iranian provinces with the highest layer chicken population.   Methods: In this cross-sectional study, 202 commercial layer chicken farms were selected from nine Irani...

Journal: :Journal of Physical Chemistry & Biophysics 2018

Journal: :L'Atelier du CRH 2011

Journal: :Science 2012

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید