نتایج جستجو برای: aes

تعداد نتایج: 8770  

Journal: :Journal of Surface Analysis 2002

2008
NICOLLE H. van SCHIJNDEL CATHERINE COLOMES BERND EDLER RICHARD HEUSDENS JESPER JENSEN SØREN HOLDT JENSEN W. BASTIAAN KLEIJN VALERY KOT BALÁZS KÖVESI JONAS LINDBLOM DOMINIQUE MASSALOUX OMAR A. NIAMUT FREDRIK NORDÉN JAN H. PLASBERG RENAT VAFIN STEVEN VAN DE PAR

NICOLLE H. van SCHIJNDEL, AES Member, JULIEN BENSA, MADS G. CHRISTENSEN, CATHERINE COLOMES, BERND EDLER, AES Member, RICHARD HEUSDENS, JESPER JENSEN, SØREN HOLDT JENSEN, W. BASTIAAN KLEIJN, VALERY KOT, BALÁZS KÖVESI, JONAS LINDBLOM, DOMINIQUE MASSALOUX, OMAR A. NIAMUT, AES Associate Member, FREDRIK NORDÉN, JAN H. PLASBERG, RENAT VAFIN, STEVEN VAN DE PAR, AES Member, DAVID VIRETTE, AND OLIVER WÜ...

2014
Suvarna Patil Rahul Patil

Cryptographic algorithm can be used to transfer the encrypted data securely on the network. AES encryption algorithm is used in many cryptographic applications. For this, various cryptographic algorithms are used for the security of different types of data like audio or video data transfer on the network. Advanced Encryption Standard (AES) is a NIST (National Institute of Standards and Technolo...

2014
Daniel Liberman Brian Mehus Sean P. Elliott

OBJECTIVE Radiation is an integral part of the treatment of many pelvic tumors. The cellular death induced by radiotherapy (RT) benefits cancer control but can also result in adverse effects (AEs) on the organ being treated or those adjacent to it. RT for cancers of the pelvis (bladder, prostate, rectum, uterus or cervix) can result in AEs in the urinary tract. While the acute urinary AEs of pe...

Journal: :The journal of medical investigation : JMI 2008
Mayumi Yamamoto Masahito Tomotake Tetsuro Ohmori

In recent years, the problem of interpersonal relationships has been reported to be associated with various adolescent psychiatric problems. Egocentrism is one factor related to the problem of interpersonal relationships. The Adolescent Egocentrism-Sociocentrism (AES) scale is used to assess egocentrism in Western countries, but no such scale has been developed in Japan. The purpose of our curr...

2009
M. Dworkin

This document is subject to BCP 78 and the IETF Trust’s Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text...

Journal: :Epilepsia 2011
Gaetano Zaccara Pierfranco Gangemi Piero Perucca Luigi Specchio

PURPOSE Despite the widespread use of antiepileptic drugs (AEDs) across different neurologic and psychiatric disorders, no study has systematically reviewed all available randomized controlled trials (RCTs) of a given AED to fully uncover its tolerability profile. We aimed at identifying treatment emergent adverse events (AEs) associated with pregabalin through a systematic review and meta-anal...

2017
Michiko Morishita Haruki Watanabe Minglu Yan Sonia Zeggar Sumie Hiramatsu Keiji Ohashi Yoshia Miyawaki Eri Katsuyama Takayuki Katsuyama Mariko Takano Narazaki Noriko Toyota Tatebe Katsue Sunahori Watanabe Tomoko Kawabata Ken-Ei Sada Jun Wada

Objective To assess the safety of azathioprine (AZA) in Japanese patients with antineutrophil cytoplasmic antibody-associated vasculitis (AAV). Methods We retrospectively enrolled 67 consecutive AAV patients who had initiated AZA treatment from January 2006 to August 2014 at Okayama University Hospital. We evaluated the development of severe adverse events (AEs), AZA discontinuation due to tota...

2010
Jiqiang Lu Jing Pan Jerry den Hartog

Differential Power Analysis (DPA) is a powerful and practical technique used to attack a cryptographic implementation in a resourcelimited application environment. Despite the extensive research on DPA of AES, it seems none has explicitly addressed the fundamental issue: How far should we protect the first and last parts of AES in order to resist practical DPA attacks, namely first and second-o...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید