نتایج جستجو برای: regions were designated

تعداد نتایج: 3713491  

2014
Zhi Zheng Andrzej Kilian Guijun Yan Chunji Liu

Fusarium crown rot (FCR) is one of the most damaging cereal diseases in semi-arid regions worldwide. The genetics of FCR resistance in the bread wheat (Triticum eastivum L.) variety EGA Wylie, the most resistant commercial variety available, was studied by QTL mapping. Three populations of recombinant inbred lines were developed with this elite variety as the resistant parent. Four QTL conferri...

2005
Jean Monnerat Serge Vaudenay

This article revisits the original designated confirmer signature scheme of Chaum. Following the same spirit we naturally extend the Chaum’s construction in a more general setting and analyze its security in a formal way. We prove its security in the random oracle model by using a random hash function and a random permutation. We notably consider the confirmer as an attacker against the existen...

2007
Chunbo Ma Jianhua Li

Most practical applications use hybrid encryption to deal with large plaintext messages since the efficiency of the public key encryption algorithm is low. As a main part of hybrid encryption schemes, Key Encapsulation Mechanism (KEM) allows a sender to generate a random session key and distribute it to recipient. In some communication scenario, one-to-group model is of importance. In this pape...

2006
Douglas Wikström

Previous de nitions of designated con rmer signatures in the literature are incomplete, and the proposed security de nitions fail to capture key security properties, such as unforgeability against malicious con rmers and non-transferability. We propose new de nitions. Previous schemes rely on the random oracle model or set-up assumptions, or are secure with respect to relaxed security de nition...

Journal: :IACR Cryptology ePrint Archive 2010
Michal Rjasko Martin Stanek

Designated verifier signature schemes allow a signer to convince only the designated verifier that a signed message is authentic. We define attack models on the unforgeability property of such schemes and analyze relationships among the models. We show that the no-message model, where an adversary is given only public keys, is equivalent to the model, where an adversary has also oracle access t...

Journal: :American Journal of Public Health 1980

Journal: :Chemical & Engineering News Archive 1998

Journal: :Global Journal of Engineering and Technology Advances 2021

In the context of mega sustainable urban development projects, this research was commenced with impartial assessing sprawl (i.e., land use versus cover variations) during 2000-2016 by remote sensing and GIS techniques, where GCR “Greater Cairo Region” taken as a case study. Primarily, literature in field technologies were assembled scrutinized. addition, data regarding build zones, agricultural...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید