>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到Tor相关记录25条 . 查询时间(0.14 秒)
近日,学院范海延教授团队在植物学TOP期刊The Plant Journal在线发表了题为Cucumber(Cucumis sativus L.)translationally controlled tumor protein interacts with CsRab11A and promotes activation of target of rapamycin in response to ...
【目的】 研究拟南芥生态型根系对镉 (Cd) 的适应性机制,挖掘耐Cd基因,为培育修复型植物提供生理基础和理论指导。 【方法】 本研究以高Cd积累同时高耐受性的拟南芥生态型Tor-1为试验材料,测定Cd处理后根系的生理变化、氧化应激反应、抗氧化酶活性,结合转录组学和可变剪接分析,以期从分子水平上解析Tor-1根系对Cd的适应性机制。 【结果】 Cd处理后,拟南芥生态型Tor-1的主根长度...
Statistical Analysis and Anonymity of TOR's Path Selection     onion routing  cryptography  cyber security       font style='font-size:12px;'> 2019/6/3
Tor is a network based on the onion routing infrastructure and provides many advantages, including tracking avoidance, research, wider access and, unfortunately, illegal activities. To achieve this, t...
TOR途径对玉米大斑病菌发育调控作用的研究     玉米大斑病菌  TOR  雷帕霉素       font style='font-size:12px;'> 2019/11/19
大斑刚毛球腔菌(Setosphaeria turcica)引起的玉米大斑病(Northern corn leaf blight)是危害玉米的一种重要真菌性叶部病害。大量研究表明,真菌病原物的生长发育及致病性受多种信号转导途径的调控,其中TOR是雷帕霉素的作用靶标,它既是一种蛋白激酶,也是一种信号转导分子,在调控细胞生长方面起核心作用。本试验用雷帕霉素处理玉米大斑病菌菌株,观察其菌落生长、菌丝形态、...
Exploring Deployment Strategies for the Tor Network     anonymity  applications  implementation       font style='font-size:12px;'> 2018/7/10
In response to upcoming performance and security challenges of anonymity networks like Tor, it will be of crucial importance to be able to develop and deploy performance improvements and state-of-the-...
雷帕霉素靶蛋白(TOR)是一种存在于真核生物中进化保守的丝氨酸/苏氨酸激酶, 通过调节细胞周期、蛋白质合成、细胞能量代谢等多种途径发挥重要的生理功能。作为真核生物生长发育与免疫应答中最重要且高度保守的宏观调控者之一, TOR已成为近年生物学领域一个新的研究热点。本文主要阐述了TOR在生物中高度保守和对雷帕霉素敏感的特性, 及其在拟南芥(Arabidopsis thaliana)、玉米(Zea ma...
Untagging Tor: A Formal Treatment of Onion Encryption     Anonymity  Onion Routing  Secure Channels       font style='font-size:12px;'> 2018/3/7
Tor is a primary tool for maintaining anonymity online. It provides a low-latency, circuit-based, bidirectional secure channel between two parties through a network of onion routers, with the aim of o...
TOR - Didactic pluggable transport     TOR network   TOR packages       font style='font-size:12px;'> 2016/5/26
Considering that access to information is one of the most important aspects of modern society, the actions of certain governments or internet providers to control or, even worse, deny access for their...
In this paper we present MATOR: a framework for rigorously assessing the degree of anonymity in the Tor network. The framework explicitly addresses how user anonymity is impacted by real-life charact...
Another Tor is possible     Tor  cryptography  privacy       font style='font-size:12px;'> 2016/1/6
The aim of this paper is to introduce some modifications in Tor, in order to improve user’s anonymity and relay’s security. Thus, we introduced a system that will ensure anonymity for all users, whil...
Proof-of-Work as Anonymous Micropayment: Rewarding a Tor Relay     Tor  Proof of Work  Crypto-currency       font style='font-size:12px;'> 2016/1/5
In this paper we propose a new micropayments scheme which can be used to reward Tor relay operators. Tor clients do not pay Tor relays with electronic cash directly but submit proof of work shares w...
A revocable anonymity in Tor     Tor  cryptography  privacy       font style='font-size:12px;'> 2016/1/3
This new protocol is based on the idea of introducing a revocable anonymity in Tor, which was presented in our recent paper entitled "Another Tor is possible". Compared to that previous paper, this ...
Tor [Dingledine et al. 2004] is the most widely used anonymity network today, serving millions of users on a daily basis using a growing number of volunteer-run routers. Since its deployment in 2003,...
A quantum-safe circuit-extension handshake for Tor     tor  lattice-based cryptography  quantum-safe cryptography       font style='font-size:12px;'> 2015/12/31
We propose a method for integrating NTRUEncrypt into the ntor key exchange protocol as a means of achieving a quantum-safe variant of forward secrecy. The proposal is a minimal change to ntor, essen...
Cryptanalysis of a fair anonymity for the tor network     Cryptography  Tor  privacy       font style='font-size:12px;'> 2015/12/31
The aim of this paper is to present an attack upon the protocol of Diaz et al. [4], which goal is to introduce a fair anonymity in the Tor network. This attack allows an attacker to impersonate Tor u...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...