搜索结果: 1-15 共查到“Tor”相关记录25条 . 查询时间(0.14 秒)
沈阳农业大学生物科学技术学院范海延课题组揭示黄瓜翻译控制肿瘤蛋白CsTCTP和CsRab11A互作调控TOR信号响应白粉病菌胁迫的分子机制(图)
范海延 黄瓜翻译 肿瘤蛋白 白粉病菌
font style='font-size:12px;'>
2024/12/9
拟南芥生态型Tor-1根系响应镉的转录组学与可变剪接分析
拟南芥生态型 根 镉 苯丙素 硫代葡萄糖苷 谷胱甘肽代谢 可变剪接
font style='font-size:12px;'>
2020/10/15
【目的】 研究拟南芥生态型根系对镉 (Cd) 的适应性机制,挖掘耐Cd基因,为培育修复型植物提供生理基础和理论指导。 【方法】 本研究以高Cd积累同时高耐受性的拟南芥生态型Tor-1为试验材料,测定Cd处理后根系的生理变化、氧化应激反应、抗氧化酶活性,结合转录组学和可变剪接分析,以期从分子水平上解析Tor-1根系对Cd的适应性机制。 【结果】 Cd处理后,拟南芥生态型Tor-1的主根长度...
Statistical Analysis and Anonymity of TOR's Path Selection
onion routing cryptography cyber security
font style='font-size:12px;'>
2019/6/3
Tor is a network based on the onion routing infrastructure and provides many advantages, including tracking avoidance, research, wider access and, unfortunately, illegal activities. To achieve this, t...
TOR途径对玉米大斑病菌发育调控作用的研究
玉米大斑病菌 TOR 雷帕霉素
font style='font-size:12px;'>
2019/11/19
大斑刚毛球腔菌(Setosphaeria turcica)引起的玉米大斑病(Northern corn leaf blight)是危害玉米的一种重要真菌性叶部病害。大量研究表明,真菌病原物的生长发育及致病性受多种信号转导途径的调控,其中TOR是雷帕霉素的作用靶标,它既是一种蛋白激酶,也是一种信号转导分子,在调控细胞生长方面起核心作用。本试验用雷帕霉素处理玉米大斑病菌菌株,观察其菌落生长、菌丝形态、...
Exploring Deployment Strategies for the Tor Network
anonymity applications implementation
font style='font-size:12px;'>
2018/7/10
In response to upcoming performance and security challenges of anonymity networks like Tor, it will be of crucial importance to be able to develop and deploy performance improvements and state-of-the-...
雷帕霉素靶蛋白(TOR)是一种存在于真核生物中进化保守的丝氨酸/苏氨酸激酶, 通过调节细胞周期、蛋白质合成、细胞能量代谢等多种途径发挥重要的生理功能。作为真核生物生长发育与免疫应答中最重要且高度保守的宏观调控者之一, TOR已成为近年生物学领域一个新的研究热点。本文主要阐述了TOR在生物中高度保守和对雷帕霉素敏感的特性, 及其在拟南芥(Arabidopsis thaliana)、玉米(Zea ma...
Untagging Tor: A Formal Treatment of Onion Encryption
Anonymity Onion Routing Secure Channels
font style='font-size:12px;'>
2018/3/7
Tor is a primary tool for maintaining anonymity online. It provides a low-latency, circuit-based, bidirectional secure channel between two parties through a network of onion routers, with the aim of o...
TOR - Didactic pluggable transport
TOR network TOR packages
font style='font-size:12px;'>
2016/5/26
Considering that access to information is one of the most important aspects of modern society, the actions of certain governments or internet providers to control or, even worse, deny access for their...
(Nothing else) MATor(s): Monitoring the Anonymity of Tor's Path Selection
Tor Tor path selection Provable privacy
font style='font-size:12px;'>
2016/1/8
In this paper we present MATOR: a framework for rigorously assessing the degree of anonymity in the
Tor network. The framework explicitly addresses how user anonymity is impacted by real-life charact...
Another Tor is possible
Tor cryptography privacy
font style='font-size:12px;'>
2016/1/6
The aim of this paper is to introduce some modifications in Tor, in order to improve user’s anonymity
and relay’s security. Thus, we introduced a system that will ensure anonymity for all users, whil...
Proof-of-Work as Anonymous Micropayment: Rewarding a Tor Relay
Tor Proof of Work Crypto-currency
font style='font-size:12px;'>
2016/1/5
In this paper we propose a new micropayments scheme which
can be used to reward Tor relay operators. Tor clients do not pay Tor
relays with electronic cash directly but submit proof of work shares w...
A revocable anonymity in Tor
Tor cryptography privacy
font style='font-size:12px;'>
2016/1/3
This new protocol is based on the idea of introducing a revocable anonymity in Tor, which was
presented in our recent paper entitled "Another Tor is possible". Compared to that previous paper, this
...
Performance and Security Improvements for Tor: A Survey
Privacy-enhancing technologies anonymity networks performance
font style='font-size:12px;'>
2016/1/3
Tor [Dingledine et al. 2004] is the most widely used anonymity network today, serving millions of users on a
daily basis using a growing number of volunteer-run routers. Since its deployment in 2003,...
A quantum-safe circuit-extension handshake for Tor
tor lattice-based cryptography quantum-safe cryptography
font style='font-size:12px;'>
2015/12/31
We propose a method for integrating NTRUEncrypt into the ntor key exchange protocol
as a means of achieving a quantum-safe variant of forward secrecy. The proposal is a minimal change
to ntor, essen...
Cryptanalysis of a fair anonymity for the tor network
Cryptography Tor privacy
font style='font-size:12px;'>
2015/12/31
The aim of this paper is to present an attack upon the protocol of Diaz et al. [4], which goal is to
introduce a fair anonymity in the Tor network. This attack allows an attacker to impersonate Tor u...