>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学
搜索结果: 1-15 共查到His-Tag相关记录48条 . 查询时间(0.171 秒)
近日,第二医院血管外科率先完成全国首例运用GORE TAG可主动调控胸主动脉覆膜支架系统CTAG with Active control Deployment System(CADS)弓部原位开窗治疗A型主动脉夹层手术。此病例以脑供血保护为关键,以双功管连接颈动脉-股动脉,保证颅内供血;运用一步法肝穿针进行原位开窗,预扩充分后用VBX球扩支架重建弓上二分支;运用GORE TAG可主动调控胸主动脉覆...
近日,华中农业大学作物遗传改良国家重点实验室李兴旺课题组研究成果以“Profiling Plant Histone Modification at Single-cell Resolution Using snCUT&Tag”为题在Plant Biotechnology Journal。研究首次报道了在植物中建立了单细胞核CUT&Tag (snCUT&Tag)方法,可以高通量分析单个细胞核的组蛋白...
There is a major interest in designing RFID schemes based on symmetric-key cryptography and ensuring efficient tag identification. These requirements taken together often lead to a decrease in the deg...
Authenticated Encryption (AEAE) achieves confidentiality and authenticity, the two most fundamental goals of cryptography, in a single scheme. A common strategy to obtain AEAE is to combine a Message ...
Among all existing identity-based encryption (IBE) schemes in the bilinear group, Wat-IBE proposed by Waters [CRYPTO, 2009] and JR-IBE proposed by Jutla and Roy [AsiaCrypt, 2013] are quite special. A ...
In this paper, we define new RKA security notions for several cryptographic primitives including message authentication code (MAC), public-key encryption (PKE) and symmetric encryption (SE). This new ...
We introduce a tag based encoding, a new generic framework for modular design of Predicate Encryption (PE) schemes in prime order groups. Our framework is equipped with a compiler which is adaptivel...
A very rapid method for isolating bacterial photosynthetic reaction centers (RCs) of high purity and yield is described. A poly-histidine tag is engineered at the C-terminus of the RC M-subunit, allow...
The Algebraic Eraser has been gaining prominence as SecureRF, the company commercializing the algorithm, increases its marketing reach. The scheme is claimed to be well-suited to IoT applications bu...
In this work, we first formalize the notion of dynamic group signatures with distributed traceability, where the capability to trace signatures is distributed among n managers without requiring any i...
Sundaresan et al proposed recently a novel ownership transfer protocol for multi-tag multi-owner RFID environments that complies with the EPC Class1 Generation2 standard. The authors claim that this p...
We present an efficient structure-preserving tagged one-time signature scheme with tight security reductions to the decision-linear assumption. Our scheme features short tags consisting of a single ...
Standard form of authenticated encryption (AE) requires the ciphertext to be expanded by the nonce and the authentication tag. These expansions can be problematic when messages are relatively short ...
Government and local government have to hurry up to build accessible facilities for elderly people and people with disabilities.Because our country is experiencing an aging society, for example, pedes...
Location-based security service provides authorization of persons or facilities based on their distinctive location information. It applies the field of position navigation and time (PNT) to the provi...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...