The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Background The plant-specific TCP transcription factors play different functions in multiple processes of plant growth and development. TCP family genes have been identified in several plant species, but no comprehensive analysis of the TCP family in grapevine has been undertaken to date, especially their roles in fruit development. Results A total of 18 non-redundant grapevine TCP (VvTCP) genes...
The article makes the improvement on the literature[1] which is based on the ID key management according to the wireless sensing network's characteristic. With the ring-tree topology structure's foundation and the LEAP agreement, the article can use the multinomial and the hashing function to make the wireless sensing network's connectivity achieve to 1, and has certain improvement in the security...
Ad Hoc network is a new type of wireless mobile networks. It does not rely on any fixed infrastructure, no center nodes, and its computing resources are limited. According to identity-based cryptography, threshold sharing scheme and mapping point algorithm, this paper presents a new Ad Hoc network security model, and verifies its safety. Safe mode without third party KGC includes sharing scheme, communication...
It's convenient for people's communication by Internet's rapid growth. Tengxun QQ is IM with excellent function using by large amount of Internet users and because of its large cardinal number of users, it becomes a target which is attacked by many Internet illegal users. This paper firstly introduces us QQ virus and their classification, virus phenomenon and several solutions about attacking for...
Digital watermark technology is a bran-new information security technology. It became a efficient way of the copyright protection of digital production. In this background, this paper researched the keystones of arithmetics based on movement vector, DWT domain and DCT domain. We analyzed deeply these embedding projects which had been lodged attached to the arithmetics, to prove why they are not fit...
Crypton is a block cipher submitted as a candidate for the advanced encryption standard (AES). It is very efficient in hardware implementations and was designed by Chae Hoon Lim. In this paper, we construct some distinguishers between 4-round Crypton and a random permutation of the blocks space. By using integral Cryptanalysis and partial sum techniques, the distinguishers are used to attack on 5...
Duo etl. gave some equivalent structures of Camellia and some observations on Camellia, but they misunderstood the key scheduling algorithm of Camellia and had the wrong complexity for some case. In this paper, we first give some four round distinguishers, then present the square attack to 7-round Camellia and 9-round Camellia, furthermore modify some analysis complexities. 7-round Camellia-128 is...
The researches and applications for digital watermarking technology are more and more extensive, at present, they mainly embodied in the watermark image, video watermarking, as well as voice in areas such as watermarks. This paper based on the popular image scrambling in the Arnold transform method gives the image on the protection of digital watermarking algorithm, the embedded watermark information...
The method that using repeating information, appeared in Web pages to represent the semantic meaning can be used to improve the correct rate of Web pages classification. This paper analyses and improves the traditional repeating patterns representation methods, and further proposes a new semantic representation of Web information based on repeating patterns. First, the repeating patterns are formal...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.