Results 101 to 110 of about 34,947 (290)

The Digital Signature Scheme MQQ-SIG [PDF]

open access: yes, 2010
This document contains the Intellectual Property Statement and the technical description of the MQQ-SIG - a new public key digital signature scheme. The complete scientific publication covering the design rationale and the security analysis will be given
Faugère, Jean-Charles   +6 more
core   +1 more source

Basal Metabolic Requirements, Biomarkers of Cardiometabolic Health, and Anthropometric Measures of Obesity in Women and Men With Restricted Growth Conditions

open access: yesAmerican Journal of Medical Genetics Part A, EarlyView.
ABSTRACT Population‐specific thresholds have not been defined for the levels of adiposity and systemic biomarkers that predict chronic health risks in people with restricted growth conditions. Here, anthropometric measures of adiposity, basal metabolic requirements, and fasted blood samples were obtained from adults with restricted growth (age 41 ± 14 ...
Lucy H. Merrell   +7 more
wiley   +1 more source

SSTR4 illetve capsaicin receptor mediált neurogéngyulladás gátló gyógyszerhatóanyagok optimalizációja, karakterizációja és farmakofor model generálása = Optimization, characterization and pharmacophore modeling of SSTR4 or capsaicin receptor mediated neurogenic inflammation inhibiting drug candidates [PDF]

open access: yes, 2009
A Klinika II fázisban lévő SSTR4 receptoron ható TT-232 heptapeptid olyan új, eltérő szerkezetű származékait állítottuk elő, ahol a biológiai hatás szempontjából fontos aminosavakat egyrészt egy pirazinon gyűrűvel ciklizáltuk, másrészt egy flexibilis ...
Hollósy, Ferenc   +7 more
core  

Hardware-based Security for Virtual Trusted Platform Modules

open access: yes, 2013
Virtual Trusted Platform modules (TPMs) were proposed as a software-based alternative to the hardware-based TPMs to allow the use of their cryptographic functionalities in scenarios where multiple TPMs are required in a single platform, such as in ...
Alsouri, Sami   +3 more
core  

A Comparison of the Standardized Versions of ECIES [PDF]

open access: yes, 2010
Elliptic Curve Cryptography (ECC) can be used as a tool for encrypting data, creating digital signatures or performing key exchanges. In relation to encryption, the Elliptic Curve Integrated Encryption Scheme (ECIES) is the best known scheme based on ECC,
Gayoso Martínez, Víctor   +3 more
core  

Year 2010 Issues on Cryptographic Algorithms [PDF]

open access: yes
In the financial sector, cryptographic algorithms are used as fundamental techniques for assuring confidentiality and integrity of data used in financial transactions and for authenticating entities involved in the transactions.
Masashi Une, Masayuki Kanda
core  

Characteristics of Enhanced Heat Transfer of Nanofluid in Microchannels Under Electric and Magnetic Co‐Excitation

open access: yesAsia-Pacific Journal of Chemical Engineering, EarlyView.
ABSTRACT Due to its small size, microchannel heat exchangers are widely used in fine engineering fields such as electronic equipment. In this paper, the boiling heat transfer characteristics of refrigerants and nanofluids in microchannels are studied by applying electric fields, magnetic fields, and electromagnetic synergistic fields.
Yanyu Wu   +4 more
wiley   +1 more source

Enhancing Superhydrophobicity of Fabrics via Chemical Vapor Deposition and Thermal Aging

open access: yesJournal of Applied Polymer Science, EarlyView.
This study combines thermal aging and chemical vapor deposition (CVD) to enhance the durability and reduce treatment time of superhydrophobic fabrics. The best superhydrophobicity and water repellency were achieved on polyethylene terephthalate (PET) and PA 66 fabrics, with minimal influence from surface energy, providing a fast and efficient method ...
Somin Lee   +3 more
wiley   +1 more source

Homâyun-nâme and Shâhnâme [PDF]

open access: yesمتن شناسی ادب فارسی, 2015
Homâyun-nâme is a verses in motagâreb meter with nearly sixty thousands couplets. This verses has been versified by a poet by the name of Zajjâji in seventh century.
Sajjad Aydenloo
doaj  

Discrete-Time Chaotic-Map Truly Random Number Generators: Design, Implementation, and Variability Analysis of the Zigzag Map

open access: yes, 2012
In this paper, we introduce a novel discrete chaotic map named zigzag map that demonstrates excellent chaotic behaviors and can be utilized in Truly Random Number Generators (TRNGs). We comprehensively investigate the map and explore its critical chaotic
Ali, Warsame H.   +2 more
core  

Home - About - Disclaimer - Privacy