20 resultados para Fatal attacks
em Chinese Academy of Sciences Institutional Repositories Grid Portal
Resumo:
Range and load play key roles in the problem of attacks on links in random scale-free (RSF) networks. In this paper we obtain the approximate relation between range and load in RSF networks by the generating function theory, and then give an estimation about the impact of attacks on the efficiency of the network. The results show that short-range attacks are more destructive for RSF networks, and are confirmed numerically.
Resumo:
In this paper, we studied range-based attacks on links in geographically constrained scale-free networks and found that there is a continuous switching of roles of short-and long-range attacks on links when tuning the geographical constraint strength. Our results demonstrate that the geography has a significant impact on the network efficiency and security; thus one can adjust the geographical structure to optimize the robustness and the efficiency of the networks. We introduce a measurement of the impact of links on the efficiency of the network, and an effective attacking strategy is suggested
Resumo:
Features of homologous relationship of proteins can provide us a general picture of protein universe, assist protein design and analysis, and further our comprehension of the evolution of organisms. Here we carried Out a Study of the evolution Of protein molecules by investigating homologous relationships among residue segments. The motive was to identify detailed topological features of homologous relationships for short residue segments in the whole protein universe. Based on the data of a large number of non-redundant Proteins, the universe of non-membrane polypeptide was analyzed by considering both residue mutations and structural conservation. By connecting homologous segments with edges, we obtained a homologous relationship network of the whole universe of short residue segments, which we named the graph of polypeptide relationships (GPR). Since the network is extremely complicated for topological transitions, to obtain an in-depth understanding, only subgraphs composed of vital nodes of the GPR were analyzed. Such analysis of vital subgraphs of the GPR revealed a donut-shaped fingerprint. Utilization of this topological feature revealed the switch sites (where the beginning of exposure Of previously hidden "hot spots" of fibril-forming happens, in consequence a further opportunity for protein aggregation is Provided; 188-202) of the conformational conversion of the normal alpha-helix-rich prion protein PrPC to the beta-sheet-rich PrPSc that is thought to be responsible for a group of fatal neurodegenerative diseases, transmissible spongiform encephalopathies. Efforts in analyzing other proteins related to various conformational diseases are also introduced. (C) 2009 Elsevier Ltd. All rights reserved.
Resumo:
About 336-444 bp mitochondrial D-loop region and tRNA gene were sequenced for 40 individuals of the giant panda which were collected from Mabian, Meigu, Yuexi, Baoxing, Pingwu, Qingchuan, Nanping and Baishuijiang, respectively. 9 haplotypes were found in 21 founders. The results showed that the giant panda has low genetic variations, and that there is no notable genetic isolation among geographical populations. The ancestor of the living giant panda population perhaps appeared in the late Pleistocene, and unfortunately, might have suffered bottle-neck attacks. Afterwards, its genetic diversity seemed to recover to same extent.
Resumo:
In five groups of seasonally provisioned Tibetan macaques (Macaca thibetana) at Mt. Emei, males were sampled for wounds as an indicator of their competition for females during about 80 days in the 1987 mating season. Quantitative data on intergroup transfer were collected in a period between June 1986 and December 1987. The young adult (YA) males, the most active age-class in mating activity and intergroup transfer, received most of the wounds. Wounds tended to appear more in the front of body for YA and subadults (SA) than they did for middle-old aged (MO) males. This implies that some of the MO males were more active and aggressive in the fights. During the 1.5 year period, 5/6 of the YA and 5/17 of the MO males made intergroup shifts. Although YA males faced a high risk of receiving wounds at transfer, they usually rose in rank. On the other hand, the MO males transferred more smoothly but dropped in rank. The peripheral SA males, which rarely emigrated in the population, were an active component in determining the wounding rate, and the rate and direction of male migration. Three SA immigrants died of severe attacks made by resident males in 1988 and 1991. Adult sex ratios and their variations were considerably reduced with male nonrandom shifts and better conservation of the population.
Resumo:
Alterations in hematological indices such as decreases in blood cell counts (RBC), hematocrit (Ht) and hemoglobin (Hb) concentrations are key symptoms of anemia. However, few experiments were conducted to examine changes in hematological indices of fish exposed to microcystins that are believed to be fatal to circulatory systems of vertebrates. An acute toxicological experiment was designed to study hematological changes of crucian carp injected intraperitoneally (i.p.) with extracted microcystins at two doses, 50 and 200 mu g MC-LReqkg(-1) body weight. After being i.p. injected with microcystins, the fish exhibited behavioral abnormity. There were significant decreases in RBC in the high-dose group, and in Ht and Hb concentrations in both dose groups, while erythrocte sedimentation rate (ESR) significantly increased, indicating the appearance of normocytic anemia. There were no prominent changes in the three red cell indices, mean corpuscular volume (MCV), mean corpuscular hemoglobin (MCH,), and mean corpuscular hemoglobin concentration (MCHC). Increases in blood urea nitrogen (BUN) and creatinine (CR) in both dose groups suggest the occurrence of kidney impairment. Alteration in blood indices was reversible at the low dose group. Conclusively, anemia induced by kidney impairment was a key factor to cause abnormity of swimming behaviors and high mortality of crucian carp. (c) 2007 Elsevier Ltd. All rights reserved.
Resumo:
Haemorrhage can be an epidemic and fatal condition in grass carp. It is known now that the Grass Carp Haemorrhage Virus (GCHV) triggers haemorrhage. Human lactoferrin (hLF) plays an important role in the non-specific immune system, making some organisms more resistant to some viruses. Sperm of grass carp was mixed with linearized pCAhLFc, which is a DNA construct containing an hLF cDNA and the promoter of common carp beta-actin gene, and then electroporated. Then, mature eggs were fertilized in vitro with the treated sperm cells. The fry were sampled and analyzed by polymerase chain reaction (PCR). Results indicated that the foreign gene had been transferred successfully into the cells of some fry. Under optimal electroporation conditions, the efficiency of gene transfer was as high as 46.8%. About 35.7% of treated 5-month-old grass carp contained foreign genes. Most transgenic fry demonstrated significant delays in onset of symptoms of haemerrhage after injection of GCHV, suggesting a significant positive relationship between hLF cDNA and levels of disease resistance (P < 0.01). Results suggest that transgenic grass carp could be bred for increased resistance to haemorrhage. (C) 2002 Elsevier Science B.V. All rights reserved.
Resumo:
The RSA-based Password-Authenticated Key Exchange (PAKE) protocols have been proposed to realize both mutual authentication and generation of secure session keys where a client is sharing his/her password only with a server and the latter should generate its RSA public/private key pair (e, n), (d, n) every time due to the lack of PKI (Public-Key Infrastructures). One of the ways to avoid a special kind of off-line (so called e-residue) attacks in the RSA-based PAKE protocols is to deploy a challenge/response method by which a client verifies the relative primality of e and φ(n) interactively with a server. However, this kind of RSA-based PAKE protocols did not give any proof of the underlying challenge/response method and therefore could not specify the exact complexity of their protocols since there exists another security parameter, needed in the challenge/response method. In this paper, we first present an RSA-based PAKE (RSA-PAKE) protocol that can deploy two different challenge/response methods (denoted by Challenge/Response Method1 and Challenge/Response Method2). The main contributions of this work include: (1) Based on the number theory, we prove that the Challenge/Response Method1 and the Challenge/Response Method2 are secure against e-residue attacks for any odd prime e; (2) With the security parameter for the on-line attacks, we show that the RSA-PAKE protocol is provably secure in the random oracle model where all of the off-line attacks are not more efficient than on-line dictionary attacks; and (3) By considering the Hamming weight of e and its complexity in the RSA-PAKE protocol, we search for primes to be recommended for a practical use. We also compare the RSA-PAKE protocol with the previous ones mainly in terms of computation and communication complexities.
Resumo:
Password authentication has been adopted as one of the most commonly used solutions in network environment to protect resources from unauthorized access. Recently, Lee–Kim–Yoo [S.W. Lee, H.S. Kim, K.Y. Yoo, Improvement of Chien et al.'s remote user authentication scheme using smart cards, Computer Standards & Interfaces 27 (2) (2005) 181–183] and Lee-Chiu [N.Y. Lee, Y.C. Chiu, Improved remote authentication scheme with smart card, Computer Standards & Interfaces 27 (2) (2005) 177–180] respectively proposed a smart card based password authentication scheme. We show that these two schemes are both subject to forgery attacks provided that the information stored in the smart card is disclosed by the adversary. We also propose an improved scheme with formal security proof.
Resumo:
作为加密标准,DES(data encryption standard)算法虽然已被AES(advanced encryption standard)算法所取代,但其仍有着不可忽视的重要作用.在一些领域,尤其是金融领域,DES和Triple DES仍被广泛使用着.而近年来又提出了一些新的密码分析方法,其中,Rectangle攻击和Boomerang攻击已被证明是非常强大而有效的.因此,有必要重新评估DES算法抵抗这些新分析方法的能力.研究了DES算法针对Rectangle攻击和Boomerang攻击的安全性.利用DES各轮最优差分路径及其概率,分别得到了对12轮DES的Rectangle攻击和对11轮DES的Boomerang攻击.攻击结果分别为:利用Rectangle攻击可以攻击到12轮DES,数据复杂度为2~(62)。个选择明文,时间复杂度为2~(42)次12轮加密;利用Boomerang攻击可以攻击到11轮DES,数据复杂度为2~(58)个适应性选择明密文,时间复杂度为2~(38)次11轮加密.由于使用的都是DES各轮的最优差分路径,所以可以相信,该结果是Rectangle攻击和Boomerang攻击对DES所能达到的最好结果.
Resumo:
研究AES-256抵抗相关密钥-不可能差分密码分析的能力.首先给出相关密钥的差分,该差分可以扩展到8轮(甚至更多轮)子密钥差分;然后构造出一个5.5轮的相关密钥不可能差分特征.最后,给出一个对7轮AES-256的攻击和4个对8轮AES-256的攻击.