-
1801
Identity-based incremental signature scheme from lattices
Published 2021-01-01“…By taking ideas of identity-based cryptography into incremental signatures, the concept of identity-based incremental signature was proposed, and then a specific scheme from lattices was also constructed.The scheme was shown to be provably secure against adaptive chosen identity and chosen message attacks in the standard model, assuming the hardness of the small integer solution problem.Theoretical analysis and experimental results show that the computational overhead of the incremental signature algorithm is less than that of the standard signature algorithm.…”
Get full text
Article -
1802
Twolined Spittlebugs in Turfgrass
Published 2005-09-01“… Spittlebugs are present throughout the entire state, but they are more abundant in northern and northwestern Florida. They attack all turfgrass species, but centipedegrass is the most susceptible. …”
Get full text
Article -
1803
Recurrent Urinary Bladder Paraganglioma
Published 2010-01-01“…A 39-year-old male presented with recurrent attacks of painless haematuria. The patient has a history of partial cystectomy for bladder paraganglioma 10 years prior to the presentation. …”
Get full text
Article -
1804
Snow damage in plantations of Austrian pine and Scots pine in the western part of the Republic of Srpska
Published 2022-12-01“…Also, the harmful effect of snow is reflected in the reduction of the vitality of damaged trees, which become suitable for the attack of other harmful biotic factors, primarily harmful insects and fungi. …”
Get full text
Article -
1805
Diseases in Florida Vegetable Garden Beans: Bush, Lima, Pole, Wax, Southern Peas, English Peas, and Snow Peas
Published 2005-07-01“… The pathogenic microorganisms that attack garden vegetables, including Bush beans, Lima beans, Pole beans, Wax beans, Southern peas, English peas, and Chinese or Snow peas can be classified into four major groups: fungi, bacteria, nematodes, and viruses. …”
Get full text
Article -
1806
Twolined Spittlebugs in Turfgrass
Published 2005-09-01“… Spittlebugs are present throughout the entire state, but they are more abundant in northern and northwestern Florida. They attack all turfgrass species, but centipedegrass is the most susceptible. …”
Get full text
Article -
1807
Premature Ventricular Complex Causing Ice-Pick Headache
Published 2017-01-01“…In this report, we describe a male patient presenting with the symptom of momentary headache attacks accompanied with instant chest pain which is associated with premature ventricular contraction.…”
Get full text
Article -
1808
Robustness Measure of China’s Railway Network Topology Using Relative Entropy
Published 2013-01-01“…The results indicate that the railway network in the 12th five-year plan has improved robustness when compare to 2008 with respect to deliberate and random attacks.…”
Get full text
Article -
1809
Diseases in Florida Vegetable Garden Beans: Bush, Lima, Pole, Wax, Southern Peas, English Peas, and Snow Peas
Published 2005-07-01“… The pathogenic microorganisms that attack garden vegetables, including Bush beans, Lima beans, Pole beans, Wax beans, Southern peas, English peas, and Chinese or Snow peas can be classified into four major groups: fungi, bacteria, nematodes, and viruses. …”
Get full text
Article -
1810
Mathematical modelling-based blockchain with attention deep learning model for cybersecurity in IoT-consumer electronics
Published 2025-02-01“…The possibility and frequency of these attacks are maximum, and their effect is highly unsafe and devastating. …”
Get full text
Article -
1811
Healthy Eating for Elders: Smart Snacking
Published 2005-02-01“…Keep these smart snacking tips in mind the next time you have a “snack attack.” This is document FCS 8698-ENG, one in a series of the Department of Family, Youth and Community Sciences, Florida Cooperative Extension Service, Institute of Food and Agricultural Sciences, University of Florida, Gainesville, FL 32611. …”
Get full text
Article -
1812
Analysis on Potential Network Security Risk of LTE Scalable Deployment
Published 2015-12-01“…Based on the introduction of the security design of LTE/SAE, a deep analysis of security risk was made including control plane's congestion, abnormal traffic attack, network convergence which might be brought during the LTE deployment. …”
Get full text
Article -
1813
Southern Green Stink Bug, Nezara viridula (Linnaeus) (Insecta: Hemiptera: Pentatomidae)
Published 2011-01-01“…It describes this shield-shaped polyphagous feeder that attacks many important food crops — distribution, description, life cycle, damage action threshold, and management. …”
Get full text
Article -
1814
Derived categories and the analytic approach to general reciprocity laws. Part I
Published 2005-01-01“…Subsequently, we begin to investigate conditions on associated sheaves and a derived category of sheaf complexes specifically designed for an attack on Hecke's eighty-year-old challenge.…”
Get full text
Article -
1815
Healthy Eating for Elders: Smart Snacking
Published 2005-02-01“…Keep these smart snacking tips in mind the next time you have a “snack attack.” This is document FCS 8698-ENG, one in a series of the Department of Family, Youth and Community Sciences, Florida Cooperative Extension Service, Institute of Food and Agricultural Sciences, University of Florida, Gainesville, FL 32611. …”
Get full text
Article -
1816
Rare Occurrence of Herpes Zoster of Trigeminal Nerve following Extraction of Tooth
Published 2015-01-01“…The triggering factors for the onset of an attack of Herpes Zoster include some form of immunosuppression. …”
Get full text
Article -
1817
Cherry Fruit Fly, Rhagoletis cingulata (Loew) (Insecta: Diptera: Tephritidae)
Published 2009-09-01“…It describes this species of fruit fly that attacks cherries and causes wormy fruits — synonyms, distribution, identification, life history and habits, and hosts. …”
Get full text
Article -
1818
Cherry Fruit Fly, Rhagoletis cingulata (Loew) (Insecta: Diptera: Tephritidae)
Published 2009-09-01“…It describes this species of fruit fly that attacks cherries and causes wormy fruits — synonyms, distribution, identification, life history and habits, and hosts. …”
Get full text
Article -
1819
Research on DoS detection and reaction of SIP application
Published 2010-01-01“…To resolve the SIP DoS hidden trouble in the ALL-IP fusion network,a novel detection and reaction method was proposed.First,the characteristic of SIP DoS behavior was analyzed deeply to enhance the pertinency of detection.Afterwards,the method used the improved SIP transaction-finite automation(IST-FA) to detect the DoS attacks.Finally,the method took the reaction based on the puzzle challenge mechanism.Simulation and analysis show that the efficiency and performance of the method can satisfy the requirement of SIP DoS prevention.…”
Get full text
Article -
1820
Solvent-Free Ring Cleavage Hydrazinolysis of Certain Biginelli Pyrimidines
Published 2018-01-01“…The nonisolable carbohydrazide intermediates are formed firstly followed by the intermolecular nucleophilic attack of terminal amino group of hydrazide function on sp2 C6 rather than the sp3 C4 to give the ring adduct which was produced as a final product.…”
Get full text
Article