Results 241 to 250 of about 6,293,788 (277)
Some of the next articles are maybe not open access.
The Key–Lock Theory and the Induced Fit Theory
, 1995It is a great pleasure for me to contribute to this symposium honoring the great scientist Emil Fischer. My graduate thesis required me to synthesize [1-14C]glucose, which introduced me to the famous Fischer-Kiliani synthesis of glucose and mannose from ...
D. Koshland
semanticscholar +1 more source
Lock and key model system [PDF]
The lock and key concept is important for various biological and colloidal self-assembly processes. We study the basic and common underlying mechanisms within a model system which consists of a biaxial elliptical key immersed in a hard-sphere solvent and a smooth lock substrate into which the key can fit geometrically.
Roland Roth+3 more
openaire +1 more source
SecEd, 2005
When exam papers are stolen or there are accusations of cheating, the security of Britain's exam system comes under scrutiny. Gary Ward explains how exam board Edexcel keeps its examination process secure
openaire +2 more sources
When exam papers are stolen or there are accusations of cheating, the security of Britain's exam system comes under scrutiny. Gary Ward explains how exam board Edexcel keeps its examination process secure
openaire +2 more sources
The key-models and their lock-models for designing new labellings of networks
IEEE Advanced Information Management, Communicates, Electronic and Automation Control Conference, 2016The security of real networks is facing serious challenges and is harder than ever. We propose an idea of “topological structure + number theory” for designing new passwords.
Hongyu Wang, Jin Xu, B. Yao
semanticscholar +1 more source
Keys for Locks in Administrative Argument
Administration & Society, 1994Developments in public administration are better understood as rhetorical rather than scientific in Herbert Simon's meaning. Administrative arguments succeed by using the six keys to acceptance of classical rhetoric: symmetry, metaphor, ambiguity, private interest presented as public good, selective use of information, and suspension of disbelief To ...
Michael Jackson, Christopher Hood
openaire +2 more sources
On the Design of a Single-Key-Lock Mechanism Based on Newton's Interpolating Polynomial
IEEE Trans. Software Eng., 1989A single-key-lock (SKL) mechanism used for implementing the access matrix of a computer protection system is proposed. The key selection is very flexible. The lock values are generated recursively using the Newton interpolating polynomial.
C. Laih, L. Harn, Jau-Yien Lee
semanticscholar +1 more source
, 2016
The present work demonstrates a new fully regenerative, molecular machine-like “ON-OFF-ON” chemosensor based on a β-carboline molecule “OFF-ON-OFF” cycle.
Suvendu Paul+5 more
semanticscholar +1 more source
The present work demonstrates a new fully regenerative, molecular machine-like “ON-OFF-ON” chemosensor based on a β-carboline molecule “OFF-ON-OFF” cycle.
Suvendu Paul+5 more
semanticscholar +1 more source
A Binary Single-Key-Lock System for Access Control
IEEE Trans. Computers, 1989A binary coding method was invented and has been applied to the single-key-lock (SKL) system which achieves access control by associating with each accesser only one key and with each resource only one lock. The new system is called the binary single-key-
Carl K. Chang, T. Jiang
semanticscholar +1 more source
Journal of Computer Science and Technology, 1987
Access control is one of the sezious problems in modern information system. In this paper we suggest a key-lock strategy to represent the privilege relationship involving linear transformations and nonlinear conetraints. The implementation shows that this strategy has got the properties of security, and information hidden, and satisfies the least ...
Jian Liu, Guoxiang Huang
openaire +2 more sources
Access control is one of the sezious problems in modern information system. In this paper we suggest a key-lock strategy to represent the privilege relationship involving linear transformations and nonlinear conetraints. The implementation shows that this strategy has got the properties of security, and information hidden, and satisfies the least ...
Jian Liu, Guoxiang Huang
openaire +2 more sources
Access Control with Single-Key-Lock
IEEE Transactions on Software Engineering, 1984Based on the concept of an access matrix, a new protection system that achieves access control is proposed. In this system, associated with each accessor is only a key, and associated with each resource is only a lock, and through simple operations on ...
Meng-Lih Wu, T. Hwang
semanticscholar +1 more source