-
2261
Analysis of security extension protocol in e-mail system
Published 2020-12-01“…E-mail is the main entry point for hackers to launch network attacks.Impersonating a trusted entity is an important means of e-mail forged.An attribute graph based on the e-mail authentication mechanism was built to measure the global adoption rate of e-mail security extension protocols for government agencies.Research on the deployment effect of security extension protocol was from three dimensions:e-mail content phishing,domain phishing,and letterhead phishing.The results show that about 70% of the SPF protocols are deployed in the mail systems of government agencies in various countries,and less than 30% of the DMARC protocol is deployed.The adoption rate of email identity detection is low.When forged e-mail gets in,the e-mail providers' warning mechanism for counterfeit emails need to be improved.…”
Get full text
Article -
2262
Endoscopic Fistulotomy – ‘The Suprapapillary Punch’: A Method of Access to the Bile Duct during ERCP
Published 1994-01-01“…Results have been excellent with only one complication, a minor attack of pancreatitis after the procedure. In summary, the suprapapillary punch or fistulotomy is a safe and useful method for entering the common bile duct when access by the usual method is impossible.…”
Get full text
Article -
2263
Multi-server conjunctive keyword searchable encryption scheme based on BDH problem
Published 2020-02-01“…Searchable encryption is a cryptographic primitive that supports users to search for keywords on ciphertext.In view of the low efficiency of traditional single-server searchable encryption schemes,it was based on the advantages of identity management in certificate management.In the multi-serve environment,a bilinear mapping was used to construct an identity-based encryption scheme that supports conjunctive keyword search.In this scheme,the storage and query of the encrypted data were allocated to different servers,and the retrieval efficiency of the user storage and keyword was improved by cooperation.Re-use the encryption and search ability of the connection keywords by using the identity of multi-server and user.At the same time,combine with the searchable encryption method of conjunctive keyword,a new security model was constructed based on bilinear pairing.And under the bilinear Diffie-Hellman problem,the scheme satisfies the ciphertext indistinguishability under selected message attack.…”
Get full text
Article -
2264
Openstack authentication protocol based on digital certificate
Published 2019-02-01“…As the industry standard for open source cloud platforms,openstack uses the single-factor authentication method based on username and password that provides by keystone components to identity authentication mechanism,while it is not suitable for application scenarios with high security level requirements.A digital certificate-based identity authentication protocol which had cloud user identification protocol and authentication protocol was designed to meet the requirements.With expending the keystone component to achieve a digital certificate-based identity authentication system,a combination of authentication server,UKey technology,encryption technology and well-established key management and so on was used.According to the research,the system can effectively resist multiple cyber-attacks and improve the security of cloud users when they log in to the cloud platform.…”
Get full text
Article -
2265
Games under Ambiguous Payoffs and Optimistic Attitudes
Published 2014-01-01“…To illustrate our model, we provide an analysis of a scenario concerning allocating resource of defending and attacking in military contexts.…”
Get full text
Article -
2266
OPTIMIZATION OF BLADE DEFLECTION BASED ON HYBRID GENETIC ALGORITHM
Published 2021-01-01“…In order to improve the energy utilization rate of the vertical axis variable angle of attack turbine,a mathematical optimization model of the blade declination angle variation rule was established,using the blade declination angle change with the position angle as the design parameter,the turbine energy utilization rate as the objective function,and genetic algorithm Combined with the method of sequential quadratic programming,the optimization calculation is carried out,and on this basis,the most suitable blade declination variation law is obtained. …”
Get full text
Article -
2267
South American Cucurbit Fruit Fly, Anastrepha grandis (Macquart) (Insecta: Diptera: Tephritidae)
Published 2004-07-01“… Anastrepha grandis (Macquart) (1846: 227), which exists in several South American countries and possibly Panama, attacks watermelon and other fruits of the family Cucurbitaceae. …”
Get full text
Article -
2268
Tarnished Plant Bug, Lygus lineolaris (Palisot de Beauvois) (Insecta: Heteroptera: Miridae)
Published 2004-07-01“… Lygus lineolaris (Palisot de Beauvois), the tarnished plant bug, attacks a wide variety of economically important herbaceous plants, vegetable crops, commercial flower plants, fruit trees, and nursery stock (Kelton 1975). …”
Get full text
Article -
2269
Possibilities for qualitative evaluation of the protection area of protective clothing
Published 2022-09-01“… Protective clothing, worn for example by police, ambulance and private security services, has the task of protecting against weapon attacks and is becoming increasingly important. International standards specify test methods to ensure the protective effects and classes, but the protective surfaces or the wearing comfort are not defined more detailed in the standards. …”
Get full text
Article -
2270
Antibacterial Peptides from Plants: What They Are and How They Probably Work
Published 2011-01-01“…Some hypotheses for their mechanisms of action and attack on the bacterial membrane surface are also proposed.…”
Get full text
Article -
2271
Research on OLE object vulnerability analysis for RTF file
Published 2016-01-01“…Besides, the detection effectiveness of the proposed method is higher than that of other methods, which can effectively defense the exploit attack of OLE object vulnerability for RTF documents.…”
Get full text
Article -
2272
Antisemitism in Medicine: An International Perspective
Published 2025-01-01“…Eventually quotas fell, and the period after World War II once again saw a tremendous growth in numbers of Jews excelling in medicine internationally. Since the Hamas attack on Israel on October 7, 2023, there has been a resurgence of antisemitism worldwide. …”
Get full text
Article -
2273
Soybean Cyst Nematode Heterodera glycines (Ichinohe, 1952) (Nematoda: Rhabdita: Heteroderidae)
Published 2025-02-01“…They are obligate parasites that attack different species of crops and weeds. Heteroderidae are divided into two groups: cyst and cystoid based on morphological alterations in their skin. …”
Get full text
Article -
2274
Mechanisms and diagnosis of myocardial ischemia in patients with intact coronary arteries
Published 2021-10-01“…This article describes pathogenetic mechanisms underlying the occurrence of myocardial ischemia and angina attacks in patients without ischemic non-obstructive coronary artery (INOCA) based on coronary angiography. …”
Get full text
Article -
2275
U.S. NATIONAL MISSILE DEFENSE DEPLOYMENT IN THE ASIA-PACIFIC REGION
Published 2015-12-01“…The ultimate goal of such large-scale missile defense deployment is to convince the adversaries that the use of ballistic missiles is useless in military terms and that any attack on the United States and its allies is doomed to failure. …”
Get full text
Article -
2276
Two-factor authenticated key agreement protocol based on biometric feature and password
Published 2017-07-01“…A new two-factor authenticated key agreement protocol based on biometric feature and password was proposed.The protocol took advantages of the user’s biological information and password to achieve the secure communication without bringing the smart card.The biometric feature was not stored in the server by using the fuzzy extractor technique,so the sensitive information of the user cannot be leaked when the server was corrupted.The authentication messages of the user were protected by the server’s public key,so the protocol can resist the off-line dictionary attack which often appears in the authentication protocols based on password.The security of the proposed protocol was given in the random oracle model provided the elliptic computational Diffie-Hellman assumption holds.The performance analysis shows the proposed protocol has better security.…”
Get full text
Article -
2277
Predatory Gall Midge (unofficial common name), Feltiella acarisuga (Vallot) (Insecta: Diptera: Cecidomyiidae)
Published 2004-11-01“…F. acarisuga could be particularly useful for integrated pest management of spider mites that attack greenhouse crops (Gillespie et al. 1998). This document is EENY-269, one of a series of Featured Creatures from the Entomology and Nematology Department, Florida Cooperative Extension Service, Institute of Food and Agricultural Sciences, University of Florida. …”
Get full text
Article -
2278
Prevalence and Scabies Severity Rate on a Goat at Mempawah Hilir, Mempawah District West Kalimantan Province
Published 2021-09-01“…This is due to weather factors in the area and the type of cage as well as inadequate maintenance management, thus making many cases of scabies attack goats.…”
Get full text
Article -
2279
Design and implementation of a model for OS kernel integrity protection
Published 2015-11-01“…Untrusted kernel extensions were considered to be a big threat to OS kernel integrity because once they were loaded into the kernel space,then they may corrupt both the OS kernel data and code at will.To address this problem,MAC-based model named MOKIP for OS kernel integrity protection was presented.The basic idea of MOKIP was to set different integrity labels for different entities in the kernel space,and then ensure that the entities with low integrity label cannot harm the entities with high integrity label.A prototype system based on the hardware assisted virtualization technology was implemented.The experimental results show that proposed system is effective at defending against various malicious kernel extension attacks within a little performance overhead which is less than 13%.…”
Get full text
Article -
2280
UNMET NEEDS OF LESBIAN WOMEN IN BREAST CANCER TREATMENT
Published 2025-02-01“…The results showed that the vulnerability process of the spouses was amplified by the need to defend themselves against constant attacks on their identities. The invisibility and discrimination of lesbian women in the oncology care network has contributed to multiplying the unmet health needs, worsening the already tenuous link with health professionals. …”
Get full text
Article