نتایج جستجو برای: ssh

تعداد نتایج: 1254  

Journal: :Journal of virology 1979
J R Gentsch G Robeson D H Bishop

We have previously reported heterologous genetic recombination resulting from crosses involving temperature-sensitive (ts) mutants of La Crosse (LAC) group II and snowshoe hare (SSH) group I ts mutants (J. Gentsch, L. R. Wynne, J. P. Clewley, R. E. Shope, and D. H. L. Bishop, J. Virol. 24:893-902, 1977). From those crosses two reassortant viruses having the large/medium/small viral RNA segment ...

2017
Chen Chen Yusufu Maimaiti Shen Zhijun Liu Zeming Guo Yawen Yu Pan Huang Tao

Slingshot (SSH) is a member of the conserved family of cofilin phosphatases that plays a critical role in cell membrane protrusion and migration by transforming inactive phosphorylated cofilin to an active form. SSH-like protein 1 (SSH-1L) expression is detected in various types of tumors; insulin induces the phosphatases activity of SSH-1L in a phosphoinositide 3-kinase-dependent manner. Howev...

Journal: :IACR Cryptology ePrint Archive 2010
Kenneth G. Paterson Gaven J. Watson

This paper presents a formal security analysis of SSH in counter mode in a security model that accurately captures the capabilities of real-world attackers, as well as security-relevant features of the SSH specifications and the OpenSSH implementation of SSH. Under reasonable assumptions on the block cipher and MAC algorithms used to construct the SSH Binary Packet Protocol (BPP), we are able t...

2013
Alexander Ritter Marcel Franz Caroline Dietrich Wolfgang H. R. Miltner Thomas Weiss

Concerning the physiological correlates of pain, the brain stem is considered to be one core region that is activated by noxious input. In animal studies, different slopes of skin heating (SSH) with noxious heat led to activation in different columns of the midbrain periaqueductal gray (PAG). The present study aimed at finding a method for differentiating structures in PAG and other brain stem ...

2001
Emilio Remolina Benjamin Kuipers

ii Chapter 1 Dissertation Overview 1 Chapter 2 SSH Overview 6 2.1 The Spatial Semantic Hierarchy . . . . . . . . . . . . . . . . . . . . . . . 6 2.2 Creating Schemas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 2.3 The SSH topological level: regions . . . . . . . . . . . . . . . . . . . . . . 9 2.4 Physical Implementation of the SSH . . . . . . . . . . . . . . . . . . . . . 1...

Journal: :IACR Cryptology ePrint Archive 2011
Stephen C. Williams

We provide an analysis of the widely deployed SSH protocol’s key exchange mechanism. We exploit the design of the SSH key exchange to perform our analysis in a modular manner. First, a shared secret key is obtained via a Diffie-Hellman key exchange. Next, a transform is applied to obtain the application keys used by later stages of SSH. We define models, following well-established paradigms, th...

1997
Emilio Remolina Benjamin Kuipers

The Spatial Semantic Hierarchy (SSH) comprises a set of distinct representations of space, each with its own ontology, each with its own mathematical foundation, and each abstracted from the levels below it. In particular, the SSH topological level is abstracted from the SSH causal level. The method used to abstract the SSH topological level has usually been dened as an abduction task, describe...

2001
Niels Provos Peter Honeyman

SSH is a widely used application that provides secure remote login. It uses strong cryptography to provide authentication and confidentiality. The IETF SecSH working group is developing SSH v2, an improved SSH protocol that fixes cryptographic and design flaws in the SSH v1 protocol. SSH v2 compatible server software is widespread. Recently discovered security flaws make it critically important...

Journal: :Nan fang yi ke da xue xue bao = Journal of Southern Medical University 2011
Wei-zhen Zhang Hai-jin Zhao Fei Zhou Wen-jun Li Shao-xi Cai

OBJECTIVE Eosinophils play a pivotal role in asthmatic airway inflammation. We previously found a significantly high expression of Slingshot-1L (SSH-1L) in peripheral eosinophils in acute exacerbations of asthma. Objective To investigate the expression and localization patterns of SSH-1L in peripheral blood eosinophils of asthmatic patients and their changes after treatment with inhaled cortico...

2012
Erik Poll

This thesis presents an evaluation of implementations of the Secure Shell (SSH) protocol by applying model-based testing techniques. In doing so, an evaluation can be given of the techniques themselves when applied to a fairly complex system such as SSH. More specifically, only the server side of the OpenSSH implementation of the SSH transport layer is actually tested and evaluated. However, th...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید