搜索结果: 1-15 共查到“presence”相关记录435条 . 查询时间(0.078 秒)
Molecular and Physiological Responses of Naturally Grown Atriplex halimus L. to Drought-Stress Recovery in the Absence or Presence of Na+ Ions Under Natural Conditions
Atriplex halimus Stress/recovery-inducible genes NaCl Photosynthesis Recovery
2023/12/4
It was suggested that Na+ ions could play a vital role in the growth of xero-halophyte Atriplex halimus. This study aims at investigating the impact of Na+ ions on the response of droughted A. halimus...
在这项研究中,我们对七个优良棉花品种的PAV模式进行了综合分析,发现大部分PAV小于20kb,小于40kb的PAV总共有1.27Gb,占到整个基因组的50.7%,大于40kb的PAV共有15430个,共有1.23Gb,占到整个基因组的49.3%。基因结构分析发现大部分缺失型PAV不在内含子区域或者外显子区域,说明这些PAV可能不对基因功能起直接作用。多倍性PAV主要定位在内含子区域,并且紧邻外显子...
Temporary Censorship Attacks in the Presence of Rational Miners
blockchain samrt contract bribery
2019/6/26
Smart contracts allow for exchange of coins according to program rules. While it is well known that so called bribery contracts can influence the incentive mechanism of a Nakamotostyle consensus, we p...
On Security of Fiat-Shamir Signatures over Lattice in the Presence of Randomness Leakage
Randomness leakage attacks Fiat-Shamir signature Dilithium
2019/6/19
Leakage during the signing process, including partial key exposure and partial (or complete) randomness leakage, may be devastating for the security of digital signatures. In this work, we consider th...
Security in the Presence of Key Reuse: Context-Separable Interfaces and their Applications
Key-reuse APIs Diffie-Hellman EdDSA
2019/5/21
Key separation is often difficult to enforce in practice. While key reuse can be catastrophic for security, we know of a number of cryptographic schemes for which it is provably safe. But existing for...
In this work, we abstract some key ingredients in previous key exchange protocols based on LWE and its variants, by introducing and formalizing the building tool, referred to as key consensus (KC) and...
Formal Verification of Masked Hardware Implementations in the Presence of Glitches
masking formal verification threshold implementations
2017/9/25
Masking provides a high level of resistance against side-channel analysis. However, in practice there are many possible pitfalls when masking schemes are applied, and implementation flaws are easily o...
We investigate the merits of altering the Garg, Gentry and Halevi (GGH13) graded encoding scheme to remove the presence of the ideal ⟨g⟩⟨g⟩. In particular, we show that we ...
Composable Masking Schemes in the Presence of Physical Defaults and the Robust Probing Model
side-channel attacks masking probing security proofs physical defaults
2017/7/26
Composability and robustness against physical defaults (e.g., glitches) are two highly desirable properties for secure implementations of masking schemes. While tools exist to guarantee them separatel...
Rotational Cryptanalysis in the Presence of Constants
Rotational cryptanalysis ARX RX-difference
2016/12/10
Rotational cryptanalysis is a statistical method for attacking ARX constructions. It was previously shown that ARX-C, i.e., ARX with the injection of constants can be used to implement any function. I...
Selective-Opening Security in the Presence of Randomness Failures
selective-opening security deterministic encryption nonce-based PKE
2016/12/9
We initiate the study of public-key encryption (PKE) secure against selective-opening attacks (SOA) in
the presence of randomness failures, i.e., when the sender may (inadvertently) use low-quality r...
History,presence and perspective of using plant extracts as commercial botanical insecticides and farm products for protection against insects–a review
medicinal plants essential oils Azadirachta Pyrethrum mechanism of action
2016/9/2
Botanical insecticides keep attracting more attention from environmental and small farmers worldwide as they are considered as a suitable alternative to synthetic insecticides. The use of secondary me...
Presence of Arcobacter species in pet cats and dogs in the Czech Republic
Arcobacter butzleri cat dog polymerase chain reaction oral smears
2016/9/1
This study was conducted to evaluate the occurrence of the genus Arcobacter in cats and dogs in the Czech Republic. These animals may be carriers of the bacteria and potential sources of human infecti...
ANALYSIS OF THE SEGMENTED FEATURES OF INDICATOR OF MINE PRESENCE
Indicator of mine presence segmentation general geometric shapes factor analysis
2016/7/27
The aim of this research is to investigate possibility for interactive semi-automatic interpretation of digital images in humanitarian demining for the purpose of detection and extraction of (strong) ...
Validity of the body mass index as an indicator of the risk and presence of overweight in adolescents
Risk factors body composition overweight
2016/5/31
The validity of the body mass index (BMI) as
an indicator of the risk of becoming overweight and of the
presence of overweight was evaluated in 6 groups of adolescents
comprising several ethnic gro...