32 resultados para Cryptographic key

em Chinese Academy of Sciences Institutional Repositories Grid Portal


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Drop tower is an important ground based facility for microgravity science experiment. The technical performances of the drop tower NMLC are advanced compared with similar facilities in the US, Germany and Japan. The main components such as drop capsule, deceleration devices, release mechanism present its advantages and creativities.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper carries out the analysis of mechanics of a grip system of three-key-board hydraulic tongs developed for offshore oil pipe lines which has been successfully used in oil fields in China. The main improvement of this system is that a lever frame structure is used in the structural design, which reduces greatly the stresses of the major components of the oil pipe tongs. Theoretical analysis and numerical calculation based on thirteen basic equations developed Show that the teeth board of the tongs is not easy to slip as frequently happens to other systems and is of higher reliability.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The template-directed fabrication of highly-ordered porous film is of significant importance in implementation of the photonic band gap structure. The paper reports a simple and effective method to improve the electrodeposition of metal porous film by utilizing highly-ordered polystyrene spheres (PSs) template. By surface-modification method, the hydrophobic property of the PSs template surfaces was changed into hydrophilic one. It was demonstrated that the surface modi. cation process enhanced the permeability of the electrolyte solution in the nanometer-sized voids of the colloidal template. The homogeneously deposited copper film with the highly-ordered voids in size of less than 500 nm was successfully obtained. In addition, it was found that large defects, such as microcracks in the template, strongly influenced the macroporous films quality. An obvious preferential growth in the cracked area was observed. (C) 2008 Elsevier B. V. All rights reserved.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Rubrifloradilactone C (4), a novel bioactive nortriterpenoid, along with four other nortriterpenoids (1-3, 5) were isolated from Schisandra rubriflora. The structure of 4 was determined by extensive NMR spectral analysis, computational evidence by using t

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Argonaute 2 gene plays a pivotal role in RNAi in many species. Herein is the first report of the cloning and characterization of Argonaute 2 gene in fish. The full-length cDNA of Gobiocypris rarus Argonaute 2 (GrAgo2) consisted of 3073 nucleotides encoding 869 amino acid residues with a calculated molecular weight of 98.499 kDa and an estimated isoelectric point of 9.18. Analysis of the deduced amino acid sequence showed the presence of two signature domains, PAZ and Piwi. RT-PCR analysis indicated that GrAgo2 mRNA expression could be detected in widespread tissues. After infection with grass carp reovirus, GrAgo2 expression was up-regulated from 12 h post-injection (p < 0.05) and returned to control levels at 48 h post-injection (p > 0.05). These data imply that GrAgo2 is involved in antiviral defense in rare minnow. (C) 2008 Published by Elsevier Ltd.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Piguetiella denticulata Liang & Xie, 1997 is redescribed based on the type series collected from the type locality, Songtao River, and streams of the Zhangjiajie Mountain in southwestern China, and specimens from several tributaries of the Yangtze River. This species is characterized by a large body size, the absence of eyespots and dorsal hair chaetae, the same size and shape of dorsal and ventral chaetae, the presence of 3-4 intermediate teeth on both ventral and dorsal chaetae, and an intestinal dilation in IX-X segments. The essential characteristics used to diagnose the genus are discussed and a key to the genus is provided.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Proceeding from the consideration of the demands from the functional architecture of high speed, high capacity optical communication network, this paper points out that photonic integrated devices, including high speed response laser source, narrow band response photodetector high speed wavelength converter, dense wavelength multi/demultiplexer, low loss high speed response photo-switch and multi-beam coupler are the key components in the system. The, investigation progress in the laboratory will be introduced.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The RSA-based Password-Authenticated Key Exchange (PAKE) protocols have been proposed to realize both mutual authentication and generation of secure session keys where a client is sharing his/her password only with a server and the latter should generate its RSA public/private key pair (e, n), (d, n) every time due to the lack of PKI (Public-Key Infrastructures). One of the ways to avoid a special kind of off-line (so called e-residue) attacks in the RSA-based PAKE protocols is to deploy a challenge/response method by which a client verifies the relative primality of e and φ(n) interactively with a server. However, this kind of RSA-based PAKE protocols did not give any proof of the underlying challenge/response method and therefore could not specify the exact complexity of their protocols since there exists another security parameter, needed in the challenge/response method. In this paper, we first present an RSA-based PAKE (RSA-PAKE) protocol that can deploy two different challenge/response methods (denoted by Challenge/Response Method1 and Challenge/Response Method2). The main contributions of this work include: (1) Based on the number theory, we prove that the Challenge/Response Method1 and the Challenge/Response Method2 are secure against e-residue attacks for any odd prime e; (2) With the security parameter for the on-line attacks, we show that the RSA-PAKE protocol is provably secure in the random oracle model where all of the off-line attacks are not more efficient than on-line dictionary attacks; and (3) By considering the Hamming weight of e and its complexity in the RSA-PAKE protocol, we search for primes to be recommended for a practical use. We also compare the RSA-PAKE protocol with the previous ones mainly in terms of computation and communication complexities.