نتایج جستجو برای: ssh
تعداد نتایج: 1254 فیلتر نتایج به سال:
We have previously reported heterologous genetic recombination resulting from crosses involving temperature-sensitive (ts) mutants of La Crosse (LAC) group II and snowshoe hare (SSH) group I ts mutants (J. Gentsch, L. R. Wynne, J. P. Clewley, R. E. Shope, and D. H. L. Bishop, J. Virol. 24:893-902, 1977). From those crosses two reassortant viruses having the large/medium/small viral RNA segment ...
Slingshot (SSH) is a member of the conserved family of cofilin phosphatases that plays a critical role in cell membrane protrusion and migration by transforming inactive phosphorylated cofilin to an active form. SSH-like protein 1 (SSH-1L) expression is detected in various types of tumors; insulin induces the phosphatases activity of SSH-1L in a phosphoinositide 3-kinase-dependent manner. Howev...
This paper presents a formal security analysis of SSH in counter mode in a security model that accurately captures the capabilities of real-world attackers, as well as security-relevant features of the SSH specifications and the OpenSSH implementation of SSH. Under reasonable assumptions on the block cipher and MAC algorithms used to construct the SSH Binary Packet Protocol (BPP), we are able t...
Concerning the physiological correlates of pain, the brain stem is considered to be one core region that is activated by noxious input. In animal studies, different slopes of skin heating (SSH) with noxious heat led to activation in different columns of the midbrain periaqueductal gray (PAG). The present study aimed at finding a method for differentiating structures in PAG and other brain stem ...
ii Chapter 1 Dissertation Overview 1 Chapter 2 SSH Overview 6 2.1 The Spatial Semantic Hierarchy . . . . . . . . . . . . . . . . . . . . . . . 6 2.2 Creating Schemas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 2.3 The SSH topological level: regions . . . . . . . . . . . . . . . . . . . . . . 9 2.4 Physical Implementation of the SSH . . . . . . . . . . . . . . . . . . . . . 1...
We provide an analysis of the widely deployed SSH protocol’s key exchange mechanism. We exploit the design of the SSH key exchange to perform our analysis in a modular manner. First, a shared secret key is obtained via a Diffie-Hellman key exchange. Next, a transform is applied to obtain the application keys used by later stages of SSH. We define models, following well-established paradigms, th...
The Spatial Semantic Hierarchy (SSH) comprises a set of distinct representations of space, each with its own ontology, each with its own mathematical foundation, and each abstracted from the levels below it. In particular, the SSH topological level is abstracted from the SSH causal level. The method used to abstract the SSH topological level has usually been dened as an abduction task, describe...
SSH is a widely used application that provides secure remote login. It uses strong cryptography to provide authentication and confidentiality. The IETF SecSH working group is developing SSH v2, an improved SSH protocol that fixes cryptographic and design flaws in the SSH v1 protocol. SSH v2 compatible server software is widespread. Recently discovered security flaws make it critically important...
OBJECTIVE Eosinophils play a pivotal role in asthmatic airway inflammation. We previously found a significantly high expression of Slingshot-1L (SSH-1L) in peripheral eosinophils in acute exacerbations of asthma. Objective To investigate the expression and localization patterns of SSH-1L in peripheral blood eosinophils of asthmatic patients and their changes after treatment with inhaled cortico...
This thesis presents an evaluation of implementations of the Secure Shell (SSH) protocol by applying model-based testing techniques. In doing so, an evaluation can be given of the techniques themselves when applied to a fairly complex system such as SSH. More specifically, only the server side of the OpenSSH implementation of the SSH transport layer is actually tested and evaluated. However, th...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید