Results 241 to 250 of about 6,293,788 (277)
Some of the next articles are maybe not open access.

The Key–Lock Theory and the Induced Fit Theory

, 1995
It is a great pleasure for me to contribute to this symposium honoring the great scientist Emil Fischer. My graduate thesis required me to synthesize [1-14C]glucose, which introduced me to the famous Fischer-Kiliani synthesis of glucose and mannose from ...
D. Koshland
semanticscholar   +1 more source

Lock and key model system [PDF]

open access: possibleEPL (Europhysics Letters), 2008
The lock and key concept is important for various biological and colloidal self-assembly processes. We study the basic and common underlying mechanisms within a model system which consists of a biaxial elliptical key immersed in a hard-sphere solvent and a smooth lock substrate into which the key can fit geometrically.
Roland Roth   +3 more
openaire   +1 more source

Under lock and key

SecEd, 2005
When exam papers are stolen or there are accusations of cheating, the security of Britain's exam system comes under scrutiny. Gary Ward explains how exam board Edexcel keeps its examination process secure
openaire   +2 more sources

The key-models and their lock-models for designing new labellings of networks

IEEE Advanced Information Management, Communicates, Electronic and Automation Control Conference, 2016
The security of real networks is facing serious challenges and is harder than ever. We propose an idea of “topological structure + number theory” for designing new passwords.
Hongyu Wang, Jin Xu, B. Yao
semanticscholar   +1 more source

Keys for Locks in Administrative Argument

Administration & Society, 1994
Developments in public administration are better understood as rhetorical rather than scientific in Herbert Simon's meaning. Administrative arguments succeed by using the six keys to acceptance of classical rhetoric: symmetry, metaphor, ambiguity, private interest presented as public good, selective use of information, and suspension of disbelief To ...
Michael Jackson, Christopher Hood
openaire   +2 more sources

On the Design of a Single-Key-Lock Mechanism Based on Newton's Interpolating Polynomial

IEEE Trans. Software Eng., 1989
A single-key-lock (SKL) mechanism used for implementing the access matrix of a computer protection system is proposed. The key selection is very flexible. The lock values are generated recursively using the Newton interpolating polynomial.
C. Laih, L. Harn, Jau-Yien Lee
semanticscholar   +1 more source

A Molecular Lock with Hydrogen Sulfate as “Key” and Fluoride as “Hand”: Computing Based Insights on the Functioning Mechanism

, 2016
The present work demonstrates a new fully regenerative, molecular machine-like “ON-OFF-ON” chemosensor based on a β-carboline molecule “OFF-ON-OFF” cycle.
Suvendu Paul   +5 more
semanticscholar   +1 more source

A Binary Single-Key-Lock System for Access Control

IEEE Trans. Computers, 1989
A binary coding method was invented and has been applied to the single-key-lock (SKL) system which achieves access control by associating with each accesser only one key and with each resource only one lock. The new system is called the binary single-key-
Carl K. Chang, T. Jiang
semanticscholar   +1 more source

A key-lock access control

Journal of Computer Science and Technology, 1987
Access control is one of the sezious problems in modern information system. In this paper we suggest a key-lock strategy to represent the privilege relationship involving linear transformations and nonlinear conetraints. The implementation shows that this strategy has got the properties of security, and information hidden, and satisfies the least ...
Jian Liu, Guoxiang Huang
openaire   +2 more sources

Access Control with Single-Key-Lock

IEEE Transactions on Software Engineering, 1984
Based on the concept of an access matrix, a new protection system that achieves access control is proposed. In this system, associated with each accessor is only a key, and associated with each resource is only a lock, and through simple operations on ...
Meng-Lih Wu, T. Hwang
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy