نتایج جستجو برای: strand protocol
تعداد نتایج: 284992 فیلتر نتایج به سال:
background: the relationship between aerobic capacity (vo2max) and physical activity throughout the world is extensive research. this study aimed to estimate aerobic capacity, and the physical activity and demographic factors that affect the male students. method: in this study, 68 male students of health school in isfahan university of medical sciences had participated voluntarily. subjects s...
Strand space logic is a formal method for analysing the security protocol. The electronic commerce protocols are of more complex structures, for example, branch structures, or a protocol is composite of multiple sub-protocols, so the analysis of electronic commerce protocols is far more complex than the analysis of authentication protocols. Fairness is a very important feature in ecommerce prot...
Next-generation sequencing (NGS) has become a powerful sequencing tool, applied in a wide range of biological studies. However, the traditional sample preparation protocol for NGS is non-strand-specific (NSS), leading to biased estimates of expression for transcripts overlapped at the antisense strand. Strand-specific (SS) protocols have recently been developed. In this study, we prepared the s...
A strand is a sequence of events; it represents either the execution of legitimate party in a security protocol or else a sequence of actions by a penetrator. A strand space is a collection of strands, equipped with a graph structure generated by causal interaction. In this framework, protocol correctness claims may be expressed in terms of the connections between strands of different kinds. In...
We extend the regular strand space model with specialized terms and we provide a message construction schema for security protocols, based on grammatical rules. Using the extended model, we present two security protocol specification models that are used by the authors in the sequential and parallel composition of security protocols.
The strand space model is one of the most successful and widely used formalisms for analysing security protocols. This might seem surprising given that the model is not able to reflect choice points in a protocol execution: the key concept in the strand space model is that of a bundle, which models exactly one possible execution of a security protocol. Inspired by the branching processes of Pet...
introduction the aim of this study was toinvestigate the sterilization potential of atmospheric pressure plasma jet (appj) and interactions of this technology with double-stranded dna using the polymerase chain reaction (pcr) and single-strand conformation polymorphism (sscp) techniques. materials and methods the plasma jet was produced through a high voltage sinusoidal power supplyusing a mixt...
Terminal continuation (TC) RNA amplification was developed originally to reproducibly and inexpensively amplify RNA. The TC RNA amplification method has been improved further by obviating second strand DNA synthesis, a cost-effective protocol that takes less time to perform with fewer manipulations required for RNA amplification. Results demonstrate that TC RNA amplification without second stra...
In this paper, we analyse the Transport Layer Security (TLS) protocol within the strand spaces setting. In [BL03] Broadfoot and Lowe suggested an abstraction of TLS. The abstraction models the security services that appear to be provided by the protocol to the high-level security layers. The outcome of our analysis provides a formalisation of the security services provided by TLS and proves tha...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید