15 resultados para ALIMENTARY SECURITY

em Chinese Academy of Sciences Institutional Repositories Grid Portal


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Bighead carp is one of the most important freshwater filter-feeding fish of Chinese aquaculture. In recent decades, there have been a number of contradictory conclusions on the digestibility of algae by bighead carp based on the results from gut contents and digestive enzyme analysis or radiolabelled isotope techniques. Phytoplankton in the gut contents of bighead carp (cultured in a large net cage in Lake Donghu) were studied during March-May. In biomass, the dominant phytoplankters in the fore-gut contents were the centric diatom Cyclotella (average 54.5%, range 33.8-74.3%) and the dinoflagellate Cryptomonas (average 22.8%, range 6.8-55.8%). Phytoplankton in water samples were generally present in proportionate amounts in samples from the fore-guts of bighead carp. The size of most phytoplankton present in the intestine of bighead carp was between 8 and 20 mum in length. Bighead carp was also able to collect particles (as small as 5-6 mum) much smaller than their filtering net meshes, suggesting the importance of mucus in collecting small particles, Examination of the change in the integrity of Cyclotella on passage through the esophagus of bighead carp indicated that disruption of the algal cell walls is principally by the pharyngeal teeth, explaining the previous contradictory conclusions. (C) 2001 Elsevier Science B.V. All rights reserved.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Interpolation attack was presented by Jakobsen and Knudsen at FSE'97. Interpolation attack is effective against ciphers that have a certain algebraic structure like the PURE cipher which is a prototype cipher, but it is difficult to apply the attack to real-world ciphers. This difficulty is due to the difficulty of deriving a low degree polynomial relation between ciphertexts and plaintexts. In other words, it is difficult to evaluate the security against interpolation attack. This paper generalizes the interpolation attack. The generalization makes easier to evaluate the security against interpolation attack. We call the generalized interpolation attack linear sum attack. We present an algorithm that evaluates the security of byte-oriented ciphers against linear sum attack. Moreover, we show the relationship between linear sum attack and higher order differential attack. In addition, we show the security of CRYPTON, E2, and RIJNDAEL against linear sum attack using the algorithm.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Password authentication has been adopted as one of the most commonly used solutions in network environment to protect resources from unauthorized access. Recently, Lee–Kim–Yoo [S.W. Lee, H.S. Kim, K.Y. Yoo, Improvement of Chien et al.'s remote user authentication scheme using smart cards, Computer Standards & Interfaces 27 (2) (2005) 181–183] and Lee-Chiu [N.Y. Lee, Y.C. Chiu, Improved remote authentication scheme with smart card, Computer Standards & Interfaces 27 (2) (2005) 177–180] respectively proposed a smart card based password authentication scheme. We show that these two schemes are both subject to forgery attacks provided that the information stored in the smart card is disclosed by the adversary. We also propose an improved scheme with formal security proof.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

National Natural Science Foundation of China; Dalian University of Technology

Relevância:

20.00% 20.00%

Publicador:

Resumo:

IEEE Reliabil Soc, Shanghai Jiao Tong Univ

Relevância:

20.00% 20.00%

Publicador: