Results 101 to 110 of about 34,947 (290)
The Digital Signature Scheme MQQ-SIG [PDF]
This document contains the Intellectual Property Statement and the technical description of the MQQ-SIG - a new public key digital signature scheme. The complete scientific publication covering the design rationale and the security analysis will be given
Faugère, Jean-Charles +6 more
core +1 more source
ABSTRACT Population‐specific thresholds have not been defined for the levels of adiposity and systemic biomarkers that predict chronic health risks in people with restricted growth conditions. Here, anthropometric measures of adiposity, basal metabolic requirements, and fasted blood samples were obtained from adults with restricted growth (age 41 ± 14 ...
Lucy H. Merrell +7 more
wiley +1 more source
SSTR4 illetve capsaicin receptor mediált neurogéngyulladás gátló gyógyszerhatóanyagok optimalizációja, karakterizációja és farmakofor model generálása = Optimization, characterization and pharmacophore modeling of SSTR4 or capsaicin receptor mediated neurogenic inflammation inhibiting drug candidates [PDF]
A Klinika II fázisban lévő SSTR4 receptoron ható TT-232 heptapeptid olyan új, eltérő szerkezetű származékait állítottuk elő, ahol a biológiai hatás szempontjából fontos aminosavakat egyrészt egy pirazinon gyűrűvel ciklizáltuk, másrészt egy flexibilis ...
Hollósy, Ferenc +7 more
core
Hardware-based Security for Virtual Trusted Platform Modules
Virtual Trusted Platform modules (TPMs) were proposed as a software-based alternative to the hardware-based TPMs to allow the use of their cryptographic functionalities in scenarios where multiple TPMs are required in a single platform, such as in ...
Alsouri, Sami +3 more
core
A Comparison of the Standardized Versions of ECIES [PDF]
Elliptic Curve Cryptography (ECC) can be used as a tool for encrypting data, creating digital signatures or performing key exchanges. In relation to encryption, the Elliptic Curve Integrated Encryption Scheme (ECIES) is the best known scheme based on ECC,
Gayoso Martínez, Víctor +3 more
core
Year 2010 Issues on Cryptographic Algorithms [PDF]
In the financial sector, cryptographic algorithms are used as fundamental techniques for assuring confidentiality and integrity of data used in financial transactions and for authenticating entities involved in the transactions.
Masashi Une, Masayuki Kanda
core
ABSTRACT Due to its small size, microchannel heat exchangers are widely used in fine engineering fields such as electronic equipment. In this paper, the boiling heat transfer characteristics of refrigerants and nanofluids in microchannels are studied by applying electric fields, magnetic fields, and electromagnetic synergistic fields.
Yanyu Wu +4 more
wiley +1 more source
Enhancing Superhydrophobicity of Fabrics via Chemical Vapor Deposition and Thermal Aging
This study combines thermal aging and chemical vapor deposition (CVD) to enhance the durability and reduce treatment time of superhydrophobic fabrics. The best superhydrophobicity and water repellency were achieved on polyethylene terephthalate (PET) and PA 66 fabrics, with minimal influence from surface energy, providing a fast and efficient method ...
Somin Lee +3 more
wiley +1 more source
Homâyun-nâme and Shâhnâme [PDF]
Homâyun-nâme is a verses in motagâreb meter with nearly sixty thousands couplets. This verses has been versified by a poet by the name of Zajjâji in seventh century.
Sajjad Aydenloo
doaj
In this paper, we introduce a novel discrete chaotic map named zigzag map that demonstrates excellent chaotic behaviors and can be utilized in Truly Random Number Generators (TRNGs). We comprehensively investigate the map and explore its critical chaotic
Ali, Warsame H. +2 more
core

