نتایج جستجو برای: re
تعداد نتایج: 175470 فیلتر نتایج به سال:
the purpose of the present randomized clinical trial study was to compare the effectiveness of bovine porous bone mineral (bpbm) with and without plasma rich in growth factors (prgf) in the treatment of mandibular class ii furcation defects.in seven patients, nine pairs of symmetric buccal or lingual mandibular class ii furcation defects were treated. in each patient, one defect received bpbm (...
the objective of this study was to evaluate the impact of short-term starvation and re-feeding on oxidative stress in mesopotamichthys sharpeyi (günther, 1874). after two weeks adaptation to new conditions, a total number of 270 fingerlings were distributed into nine 300-l fiberglass tanks, equipped with aeration system in three treatments including 4, 8 and 16 days starvation (each in 3 replic...
هدف از انجام این مطالعه، تشخیص اندومتریت تحت بالینی در گاوهای واکل با استفاده از روش سیتولوژی و تأثیر این عارضهبر روی میزان باروری در تلقیح بعدی بود. بدین منظور تعداد 77رأس گاو شکم 1-5با سابقه بیش از 3بار تلقیح (میانگینتعداد تلقیح، )3/8و فاصله زمانی 190±40روز از زمان زایمان که ترشحات غیر طبیعی نداشته و در آزمایش رکتال و معاینه باسونوگراف نیز رحمشان طبیعی بوده و در فاز لوتئال سیکل فحلی قرار داشت...
In an identity-based proxy re-encryption scheme, a semi-trusted proxy can convert a ciphertext under Alice’s public identity into a ciphertext for Bob. The proxy does not know the secret key of Alice or Bob, and also does not know the plaintext during the conversion. In identity-based proxy re-encryption, the collusion of the proxy and a delegatee may result in the decryption of ciphertext for ...
ZHONG-MEI WAN, JIAN WENG, XUE-JIA LAI, SHENG-LI LIU AND JI-GUO LI Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai 200240, P.R. China College of Science Department of Computer Science Hohai University Nanjing 210098, P.R. China E-mail: [email protected] Department of Computer Science Jinan University Guangzhou 510630, P.R. China School of Information System...
Proxy re-encryption is a cryptographic primitive developed to delegate the decryption right from one party (the delegator) to another (the delegatee). So far, research efforts have only been devoted to the intra-domain setting, where the delegator and the delegatee are registered in the same domain. In this paper, we investigate the proxy re-encryption in the inter-domain setting, where the del...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید