نتایج جستجو برای: 47–58.

تعداد نتایج: 84  

1998
C. Motch

We report the discovery of a transient jet in the supersoft X-ray source RX J0925.7-4758. The jet was observed in the Hα line during a single night in June 1997 and had disappeared one day later. RX J0925.7-4758 is the third supersoft source to exhibit collimated outflows. The peak jet velocity of 5,200 km s−1, strongly argues in favour of a white dwarf in RX J0925.7-4758. Simple modelling of t...

Journal: :Papers of the Bibliographical Society of Canada 2022

Mira Falardeau, L’art de la bande dessinée actuelle au Québec, Québec : Presses l’Université Laval, 2020, 176 p., ISBN 978-2-7637-4758-3 (broché)

2007
Alexander Iliev Sean W. Smith

Many security protocols refer to a trusted third party (TTP) as an ideal way of handling computation and data with conflicting stakeholders. Subsequent discussion usually dismisses a TTP as hypothetical or impractical. However, the last decade has seen the emergence of hardware-based devices like the IBM 4758 that, to high assurance, can carry out computation unmolested; TPM-based systems like ...

Journal: :Oncology reports 2014
Tetsuya Omura Yutaka Shimada Takuya Nagata Tomoyuki Okumura Junya Fukuoka Fuminori Yamagishi Sadakatsu Tajika Sanae Nakajima Atsushi Kawabe Kazuhiro Tsukada

S-1 has been recommended as adjuvant chemotherapy in patients after curative surgery for gastric cancer. However, some patients suffer recurrence even after S-1 adjuvant chemotherapy. The present study was conducted to find a predictive marker of the efficacy of S-1 adjuvant chemotherapy. We examined the microRNA (miRNA) expression of 35 patients who underwent S-1 adjuvant chemotherapy after cu...

2005
Paul Youn Ben Adida Mike Bond Jolyon Clulow Jonathan Herzog Amerson Lin Ronald L. Rivest Ross Anderson

In this work, we present the first automated analysis of security application programming interfaces (security APIs). In particular, we analyze the API of the IBM 4758 CCA, a hardware security module for banking networks. Adapting techniques from formal analyses of security protocols, we model the API purely according its specification and assuming ideal encryption primitives. We then use the a...

2011
Hyundo Reiner

Our project goal is to have the AR.Drone perform an autonomous object search in a known environment and return the location of the object being searched to the user. The environment is represented as an undirected, connected graph and mapped out a priori. Path planning depends on the history of where objects have been found in the past. The optimal path calculated assumes that the previous loca...

Journal: :Publications of the Astronomical Society of Japan 1998

2001
Nick Howgrave-Graham Joan G. Dyer Rosario Gennaro

In this paper we explore pseudo-random number generation on the IBM 4758 Secure Crypto Coprocessor. In particular we compare several variants of Gennaro's provably secure generator, proposed at Crypto 2000, with more standard techniques based on the SHA-1 compression function. Our results show how the presence of hardware support for modular multiplication and exponentiation aaects these algori...

2005
Graham Steel

We introduce XOR constraints, and show how they enable a theorem prover to reason effectively about security critical subsystems which employ bitwise XOR. Our primary case study is the API of the IBM 4758 hardware security module. We also show how our technique can be applied to standard security protocols.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید