To see the other types of publications on this topic, follow the link: Crypter.

Dissertations / Theses on the topic 'Crypter'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Crypter.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Palm, Patrik. "Utvärdering av antivirusskydd mot genererade trojaner : Är de ett hot?" Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-46848.

Full text
Abstract:
I denna uppsats avser författaren att utvärdera om det är möjligt för en hemanvändare attskapa en trojan med ett program som genererar trojaner och med hjälp av andra gratisverktyg ta sig förbi antivirus-program. Samtidigt så kommer antivirus-program utvärderas angående hur dem lyckas skydda sig mot de skapade trojanerna och ge en överblick om hur skyddet är, både via uppladdning av trojaner till VirusTotal samt test av olika antivirusprogram. Den vetenskaplig forskning som gjorts tidigare som denna uppsats kommer vara snarlikgår att finna i [5]. Det forskas även om nya idéer för att upptäcka trojaner redan när dembörjar kommunicera[4] Uppsatsens resultat består av tre delar, resultat av uppladdning av trojaner viaVirusTotal, resultat av skanning med antivirus-program samt en kort analys omresultaten. I resultatet om VirusTotal så får en överblick om hur antivirus-programupptäcker Remote Access Trojaner(RAT) som blivit genererade i ett program.Dessa RATs görs även mer svårupptäckta av verktyg som går att få tag i gratis, cryptersför att kryptera trojanerna och binders för att binda trojaner ihop med en annan fil. Efterantivirus-skanningen redovisas resultat om hur ett antal utvalda antivirus-program klararav att skydda en PC mot RATs. I resultaten upptäcktes det att säkerheten är i vissa fallganska undermålig, men att det även finns antivirus-program som skyddar betydligtbättre än andra.
APA, Harvard, Vancouver, ISO, and other styles
2

Galway, Carol. "Wilhelm Busch, cryptic enigma." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2001. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/NQ60537.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lévy, Pascal. "Télécommunications cryptées par chaos." Besançon, 2004. http://www.theses.fr/2004BESA2048.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Patrick, Ardhe, and Sebastian Karlsson. "The crypto catalyst." Thesis, Linnéuniversitetet, Institutionen för marknadsföring (MF), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-75548.

Full text
Abstract:
In a scope where continuous innovations are seen each day, the cyberspace can be seen as the tech-entrepreneurs’ playground for delivering new solutions to customers. Digital start-ups who interact through the cyberspace operate with little to no restriction despite having limiting resource. In 2008 a man named Satoshi Nakamoto developed a new technology called blockchain. The new breed of firms providing blockchain solutions have been painted to live in a borderless world with little technical restrictions. Exploring the effects that blockchain brings to their internationalisation has brought our attention to study the early internationalisation of blockchain born globals and their business ecosystem. The deductive and qualitative approach gave the results from four different companies that were involved in blockchain technology. By using previous theory on internationalisation and a deductive approach a conceptual synthesis was developed. The synthesis was later applied in the case-companies to observe the results. The findings have shown that the firms implementing blockchain in the core offering has resulted in an accelerated internationalisation. The major factors contributing to this quick internationalisations is the spread of knowledge between buyers and sellers, trough the cyberspace. However, the authors were unable to find a relationship between the accelerated internationalisation and to the extent in which a firm has implemented blockchain in its core offering. The finding has given the authors prominent answers to the research question and has highlighted the complexity of the subject. The, authors conclude the thesis by displaying the importance of cyberspace in the business ecosystem; how it attracts customers and the importance of the company’s business model. Blockchain technology proved to have effects on the process of internationalisation due to superior technological performance, but also its hype.
APA, Harvard, Vancouver, ISO, and other styles
5

Ratté, Simon-Pierre. "Du neuf sur la cryptie?" Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp03/MQ55604.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Farajallah, Mousa. "Chaos-based crypto and joint crypto-compression systems for images and videos." Nantes, 2015. http://archive.bu.univ-nantes.fr/pollux/show.action?id=3c98f067-1a81-4690-9ac6-a515090c482e.

Full text
Abstract:
La sécurité des données images et vidéos est importante pour beaucoup d’applications qui exigent du temps réel et un haut niveau de sécurité. Dans la première partie de ce travail, quatre cryptosystèmes basés chaos flexibles, efficaces et très robustes contre la cryptanalyse sont conçus et réalisés. Les deux premiers s’appuient sur le réseau SPN. La substitution est réalisée par une carte Skew tent (FSTM) modifiée pour surmonter différents problèmes : point fixe, restriction de la taille de la clé et limitation de la cartographie entre les textes d’origines et chiffrés. Le troisième cryptosystème est de structure nouvelle et également efficace. Il est basé sur une couche de diffusion binaire de pixels, suivi par une couche de permutation des bits. La permutation est réalisée par une nouvelle formulation efficace de la carte 2-D Cat. Le quatrième cryptosystème, est plus rapide que les autres avec un niveau de sécurité très élevé. Sa conception s’appuie sur une cryptanalyse partielle, que nous avons réalisée, de l’algorithme de Zhang. Dans la deuxième partie, deux crypto-compression basés chaos sélectifs et rapides sont utilisés pour sécuriser le flux HEVC et SHVC. Dans le premier crypto-compression, un nouvel algorithme pour définir les bits chiffrables dans le flux binaire du HEVC et du SHVC est proposé. La solution proposée chiffre un ensemble de paramètres SHVC sensibles au niveau du codeur entropique (CABAC), tout en préservant l’ensemble des fonctionnalités SHVC. Basé sur le concept de tuile, le deuxième crypto-compression proposé permet une protection de la vidéo au niveau d’une Région d’Intérêt (ROI) définie dans le standard HEVC<br>The security of image and video data is important for many applications which require in real-time a high security level. In the first part of this work, four chaos-based cryptosystems, flexible, efficient, and more robust against cryptanalysis, are designed and realized. The first two cryptosystems are based on the substitution-permutation network. The substitution is achieved by a proposed modified Finite Skew Tent Map (FSTM) to overcome various problems: fixed point, key space restriction, and limitation of mapping between plaintext and ciphertext. The third cryptosystem is a new and efficient structure. It is based on a binary diffusion layer of pixels, followed by a bit-permutation layer. The permutation is achieved by an efficient proposed formulation of the 2-D cat map. The fourth cryptosystem is faster than the others, having a very high security level. The confusion and the diffusion are performed in a single scan. Its design is based on a partial cryptanalysis that we performed on the Zhang algorithm. In the second part, two fast and secure selective chaos-based crypto-compressions are designed and realized to secure the High Efficiency Video Coding (HEVC) and its scalable version. In the first crypto-compression, a new algorithm is proposed to define the encryptable bits in the bit stream of the HEVC and the SHVC systems. The proposed solution encrypts a set of sensitive SHVC parameters at the entropy encoder (CABAC), while preserving all SHVC functionalities. Based on the tile concept, the second proposed crypto-compression provides protection of the ROI defined in the standard HEVC
APA, Harvard, Vancouver, ISO, and other styles
7

MELLO, CLAUDIO GOMES DE. "CRYPTO-COMPRESSION PREFIX CODING." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2006. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=9932@1.

Full text
Abstract:
Cifragem e compressão de dados são funcionalidades essencias quando dados digitais são armazenados ou transmitidos através de canais inseguros. Geralmente, duas operações sequencias são aplicadas: primeiro, compressão de dados para economizar espaço de armazenamento e reduzir custos de transmissão, segundo, cifragem de dados para prover confidencialidade. Essa solução funciona bem para a maioria das aplicações, mas é necessário executar duas operações caras, e para acessar os dados, é necessário primeiro decifrar e depois descomprimir todo o texto cifrado para recuperar a informação. Neste trabalho são propostos algoritmos que realizam tanto compressão como cifragem de dados. A primeira contribuição desta tese é o algoritmo ADDNULLS - Inserção Seletiva de Nulos. Este algoritmo usa a técnica da esteganografia para esconder os símbolos codificados em símbolos falsos. É baseado na inserção seletiva de um número variável de símbolos nulos após os símbolos codificados. É mostrado que as perdas nas taxas de compressão são relativamente pequenas. A segunda contribuição desta tese é o algoritmo HHC - Huffman Homofônico-Canônico. Este algoritmo cria uma nova árvore homofônica baseada na árvore de Huffman canônica original para o texto de entrada. Os resultados dos experimentos são mostrados. A terceira contribuição desta tese é o algoritmo RHUFF - Huffman Randomizado. Este algoritmo é uma variante do algoritmo de Huffman que define um procedimento de cripto-compressão que aleatoriza a saída. O objetivo é gerar textos cifrados aleatórios como saída para obscurecer as redundâncias do texto original (confusão). O algoritmo possui uma função de permutação inicial, que dissipa a redundância do texto original pelo texto cifrado (difusão). A quarta contribuição desta tese é o algoritmo HSPC2 - Códigos de Prefixo baseados em Substituição Homofônica com 2 homofônicos. No processo de codificação, o algoritmo adiciona um bit de sufixo em alguns códigos. Uma chave secreta e uma taxa de homofônicos são parâmetros que controlam essa inserção. É mostrado que a quebra do HSPC2 é um problema NP- Completo.<br>Data compression and encryption are essential features when digital data is stored or transmitted over insecure channels. Usually, we apply two sequential operations: first, we apply data compression to save disk space and to reduce transmission costs, and second, data encryption to provide confidentiality. This solution works fine for most applications, but we have to execute two expensive operations, and if we want to access data, we must first decipher and then decompress the ciphertext to restore information. In this work we propose algorithms that achieve both compressed and encrypted data. The first contribution of this thesis is the algorithm ADDNULLS - Selective Addition of Nulls. This algorithm uses steganographic technique to hide the real symbols of the encoded text within fake ones. It is based on selective insertion of a variable number of null symbols after the real ones. It is shown that coding and decoding rates loss are small. The disadvantage is ciphertext expansion. The second contribution of this thesis is the algorithm HHC - Homophonic- Canonic Huffman. This algorithm creates a new homophonic tree based upon the original canonical Huffman tree for the input text. It is shown the results of the experiments. Adding security has not significantly decreased performance. The third contribution of this thesis is the algorithm RHUFF - Randomized Huffman. This algorithm is a variant of Huffman codes that defines a crypto-compression algorithm that randomizes output. The goal is to generate random ciphertexts as output to obscure the redundancies in the plaintext (confusion). The algorithm uses homophonic substitution, canonical Huffman codes and a secret key for ciphering. The secret key is based on an initial permutation function, which dissipates the redundancy of the plaintext over the ciphertext (diffusion). The fourth contribution of this thesis is the algorithm HSPC2 - Homophonic Substitution Prefix Codes with 2 homophones. It is proposed a provably secure algorithm by using a homophonic substitution algorithm and a key. In the encoding process, the HSPC2 function appends a one bit suffx to some codes. A secret key and a homophonic rate parameters control this appending. It is shown that breaking HSPC2 is an NP-Complete problem.
APA, Harvard, Vancouver, ISO, and other styles
8

Lo, Gerfo Luisa Maria. "Cryptes, chambres de momification et procédés de conservation des corps(siècles XVIII-XIX) dans le contexte archéologiques et paléopathologique de la Sicile." Thesis, Aix-Marseille, 2013. http://www.theses.fr/2013AIXM5026.

Full text
Abstract:
Devant les processus de décomposition, les sociétés humaines réagissent en pratiquant interventions culturelles de 'thanato-métamorphose' sur les cadavres, comme la momification. En Sicile nous trouvons une pratique de momification toute originelle (XVIe ÷ XIXe siècles), pratiquée par les moines des congrégations religieuses, qui se développe selon une série de variations locales. Elle est le fruit d’une longue et non définitive expérimentation, consistant dans une méthode empirique de dessiccation des dépouilles mortelles. Le procédé de conservation se déroulait dans les chambres souterraines annexées aux églises, pourvues des égouttoirs. La momification reflétait des fonctions et idéologies précises, vivement lié aux possibilités économiques des individus, nécessaires pour maintenir le status économique et social d’appartenance. La lente disparition de la pratique de momification des corps remonte au l’édit de Saint-Cloud du 1804, qui marque l’interdiction législative d’inhumation des cadavres dans les églises et l’apparition des premiers cimetières extra moenia. Cependant, beaucoup d'éléments de la séculaire pratique de la momification survécurent. Les données recueillies nous poussent à penser que la momification fût une pratique bien enracinée dans le monde sicilien, et qu’après et malgré les décrets législatifs du 1804, elle ait 'survécu', en influençant l'enterrement et la relation avec la Mort jusqu'à nos jours<br>Having to do with the processes of decomposition, the human societies react by practicing cultural interventions of 'thanato-metamorphosis' on bodies, as the mummification. In Sicily we find a practice of mummification really original (XVI th ÷ XIX th centuries), practiced by the monks of the religious congregations, which develops according to a series of local variations. This practice is the fruit of long and not definitive experimentation, consisting in an empirical method of dehydration of human remains. The process of conservation of bodies took place in the subterranean rooms annexed to churches, provided with colanders. The mummification reflected particulars functions and ideologies, deeply tied to the economic possibilities of the individuals, necessaries to maintain the economic and social status of belonging. The slow disappearance of the mummification’s practice goes up to the edict of Saint-Cloud of the 1804, which marks the legislative interdiction of burial’s bodies in churches and the appearance of first cemeteries extra moenia. However, many elements of secular practice of mummification have survived. By the informations gathered on mummification’s practice we think that the practice was well rooted in the sicilian world, after the legislative decree of the 1804, and that it has survived, by influencing to bury and the relation with the Death until our days
APA, Harvard, Vancouver, ISO, and other styles
9

Totolici, Alexandru. "CRYPSTOR : a platform for secure storage." Thesis, University of British Columbia, 2013. http://hdl.handle.net/2429/44603.

Full text
Abstract:
Cloud computing continues to grow as a preferred development and deployment model, enabling new types of applications to be built while keeping resource requirements convenient for developers. Sacrifices have been made, however, in terms of the security and protection of data stored in these cloud applications, leaving users vulnerable to information leaks and invasions of privacy. We present CRYPSTOR, a storage platform design that addresses data security in the cloud computing context through the use of encryption, while maintaining the desirable properties of the current model, such as efficient storage and sharing.
APA, Harvard, Vancouver, ISO, and other styles
10

Heffelfinger, Blair. "The adherence of Acidiphilium cryptum to chalcopyrite." Thesis, University of British Columbia, 1990. http://hdl.handle.net/2429/28792.

Full text
Abstract:
Acidiphilium cryptum is a heterotrophic acidophile commonly found in acidic environments and industrial bioleaching operations. Attachment to mineral surfaces may serve to maintain this organism in aqueous environments where it is subject to removal by hydrodynamic forces. Using indirect and direct methods we have looked at the binding of A.cryptum to chalcopyrite (CuFeS₂) and other mineral ores to determine whether specific adhesins mediate binding. A modified ELISA binding assay (the Ore ELISA) was developed to measure direct adherence. Finely ground chalcopyrite was bound irreversibly to the walls of an ELISA plate, the organisms were added and after incubation and washing, the number of attached bacteria were assessed by reacting with anti-A.cryptum antibody followed by goat anti-rabbit IgG conjugated to alkaline phosphatase. This assay was found to be sensitive, rapid and reproducible. The Ore ELISA allowed direct binding measurement in the presence of various inhibitors and provided a rapid screening method for adherence-defective mutants. Adherence was shown to be saturable and increased slightly as pH decreased. A moderate increase in binding affinity was recorded in the presence of monovalent and divalent cations and EDTA. Various bactericidal agents and pentose and hexose sugars had no effect on chalcopyrite attachment. Reducing agents had little effect on cell adherence. A strong increase in adherence was observed in the presence of surface active agents. Bovine serum albumin and gelatin were both found to markedly reduce mineral surface binding. Competition for attachment sites between A.cryptum and the autotrophic acidophile, Thiobacillus ferrooxidans, showed that each organism binds to unique sites on the chalcopyrite surface. A.cryptum mutant strains displaying reduced adherence to chalcopyrite were shown to lack a 31.6 kDa outer membrane protein.<br>Science, Faculty of<br>Microbiology and Immunology, Department of<br>Graduate
APA, Harvard, Vancouver, ISO, and other styles
11

Anderlid, Britt-Marie. "Cryptic chromosome abnormalities in idiopathic mental retardation /." Stockholm : [Karolinska institutets bibl.], 2001. http://diss.kib.ki.se/2001/91-7349-097-0/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Meng, Li. "Studies of cryptic phytochromes in Rhodopsedomonas palustris." Thesis, University of British Columbia, 2008. http://hdl.handle.net/2429/2485.

Full text
Abstract:
Bacteriophytochromes (Bphs) comprise a family of protein photoreceptors that help bacteria sense changes in light. Bphs contain a chromophore that, upon absorption of red or far-red light, undergoes a cis-trans isomerization that leads to a conformational change in the holoprotein (photoconversion). In the active conformation, Bphs act as a kinase and regulate gene expression through phosphorylation of target proteins. Two putative Bph orfs (rpa0122 and rpa0990) in the Rhodopseudomonas palustris genome encode Bph-like proteins that have a conserved chromophore-binding cysteine residue. The hypothesis is that one or both of these unique Bph-like genes encode proteins that are capable of binding a chromophore and functioning to modulate the cell’s phenotype. I expressed and purified His-tagged RPA0990 in R. palustris, because proteolytic degradation was observed during overexpression in an E coli. expression system. The results show that RPA0990 contains a chromophore and is capable of photoconversion. The wavelengths of light absorbed by the Pr/Pfr forms of RPA0990, predicted to be active and inactive forms respectively, were determined to be 695 nm and 755 nm. Investigation into the phenotype of the bph mutants rpa0122 and rpa0990 revealed that both of these Bphs may have a small effect on light-harvesting complexes. Also, it was observed that the absence of O₂ does not inhibit the normal function of Bphs, although O₂ was thought to be needed to make a linear tetrapyrrole cofactor, by cleaving heme using heme oxygenase. I suggest that a linear tetrapyrrole can be made anaerobically, either through anaerobic heme cleavage by a novel enzyme, or directly from the heme precursor hydroxymethylbilane without ring cleavage. The activity of a divergent promoter region between the rpa1490 (bph3) and rpa1491 (pucBe) genes was evaluated by using the E. coli lacZ gene as a reporter. The results indicated that the pucBe promoter has much higher activity than the bph3 promoter. It was also found that double knockout of the regulatory genes ppsR1ˉ2ˉ led to an increase in bph3::lacZ expression and a decrease in pucBe::lacZ expression.
APA, Harvard, Vancouver, ISO, and other styles
13

Choong, Wi Yan Kelly. "Cryptic marketing : strategic targeting of subculture markets." Thesis, Queensland University of Technology, 2015. https://eprints.qut.edu.au/79904/4/Wi_Choong_Thesis.pdf.

Full text
Abstract:
This research aims to understand what factors influence consumers' behaviour to subculture marketing and how companies can strategically overcome potential brand alienation. Findings validate cryptic marketing as a strategy for organizations to communicate effectively with their chosen market through the use of cryptic cues, symbols and messages while circumventing negative responses from non-target audiences. The thesis contributes to extending current understanding of marketing communication through the use of covert strategies, employing covert tactics on the non-target, wider market instead of the target, subculture market.
APA, Harvard, Vancouver, ISO, and other styles
14

Harnois, Charlene. "Régulation de la survie chez les cellules de la crypte intestinale humaine." Mémoire, Université de Sherbrooke, 2000. http://savoirs.usherbrooke.ca/handle/11143/3223.

Full text
Abstract:
Dans le but de mieux caractériser les différences potentielles dans la régulation de la survie cellulaire le long de l'axe crypte-villosité, mon projet de recherche consistait à analyser la régulation de la survie des cellules de la crypte intestinale humaine. Pour ce faire, les analyses ont été effectuées chez les cellules cryptales normales HIEC (Human Intestinal Epithelial Cell), et ce, par l'inhibition de voies et/ou de molécules de signalisation telle que les MAPKs p42/p44, P13-K (phosphatidylinositol 3-kinase), les MAPKs p38 et FAK (kinase d'adhésion focalisée). Suite à ces inhibitions, nous avons analysé la présence ou l'absence d'apoptose, ainsi que les niveaux relatifs d'expression des homologues Bcl-2. Ainsi, nous avons analysé les homologues Bcl-2 au niveau des cellules indifférenciées de la crypte. Nous avons observé une modulation différentielle des niveaux relatifs d'expression des homologues, cette modulation variant selon les voies de transduction inhibées. Par exemple, les niveaux relatifs d'expression de l'homologue anti-apoptotique Mcl-1 sont augmentés par l'inhibition de la FAK, tandis que ceux de Bax ne sont pas affectés.
APA, Harvard, Vancouver, ISO, and other styles
15

Harnois, Charlene. "Régulation de la survie chez les cellules de la crypte intestinale humaine." Sherbrooke : Université de Sherbrooke, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Stevens, Peter M. (Peter Michael). "Host races and cryptic species in marine symbionts." Thesis, University of Auckland, 1990. http://hdl.handle.net/2292/2321.

Full text
Abstract:
The Pinnotheridae is a family of decapod crustaceans comprising more than 120 mostly microphagous and commensal species. As symbionts of a variety of aquatic invertebrates, pinnotherids typically live in an intimate association with their host depending on it for an almost lifelong source of nourishment and shelter, together with a site for mating. The New Zealand pinnotherid fauna was thought to comprise only one species, Pinnotheres novaezelandiae Filhol, associated with a multitude of hosts. Recently, however, a separate species, P. atrinicola Page, has been described which is regarded as being host specific to the horse mussel Atrina zelandica Gray. In this context, the relationship between pea crabs and their hosts is of special interest, and is the focus of this thesis. An investigation into the population dynamics of the symbiotic relationship between P novaezelandiae and its host, the green-lip mussel Perna canaliculus, at Westmere Reef, Auckland between May 1986 and July 1988 is reported. Ovigerous females and Stage I males and females were found throughout the sampling period, indicating that reproduction is continuous in this species. The developmental composition of the pea crab population reveals that soft-shelled males, usually regarded as an anomalous instar, formed a significant component of the pea crab population at all times. It is suggested that these individuals represent a distinct facies, analogous to the Stage II female instar. The presence of a pea crab was found to have a highly significant detrimental effect on mussel condition. Analysis of the distribution of pea crabs among the mussel population indicates mature crabs display a repulsed distribution favouring to live a solitary existence, whereas younger (pre-hard and Stage I) crabs showed a random distribution in broad agreement with a theoretical Poisson distribution. The biological status of the two described taxa was investigated by a survey of electrophoretically detectable genetic variation of populations from throughout the North Island of New Zealand. Pea crabs from 18 host populations from nine geographically disparate localities were subjected to cellulose acetate and poly-acrylamide electrophoresis. Forty-one enzyme systems were screened for polymorphism. Clearly resolved enzyme phenotypes were obtained at 23 presumptive loci, of which l5 exhibited polymorphism. An analysis of electromorph frequency data revealed that both taxa are highly genetically structured and typified by high levels of polymorphism and heterozygosity; results atypical of brachyuran crabs. P- atrinicola was found to exhibit strong patterns of geographic differentiation and clinal variation in electromorph frequency. Of particular significance is the pattern of genetic differentiation observed among populations of p. novaezelandiae. Hierarchical F-statistics indicated that the preponderance of inter-population differentiation can be attributed to differences in electromorph frequency among host-associated populations of P. novaezelandiae within a sampling locality. Geographic differentiation was a comparatively insignificant factor in the structuring of the sampled P. novaezelandiae populations. Individuals belonging to two genetically very distinct units were found within a newly recorded host species, Mactra ovata ovata Gray at Green and Wood Bays, Manukau Harbour. Hardy-Weinberg analyses indicate the host-associated populations of P. novaezelandiae exhibit such a pronounced pattern of homozygote excess and disturbance from genetic equilibrium in sympatry that it is unreasonable to consider them as a single panmictic population. It is concluded that significant biological discontinuities based on host origin exist within the currently recognised taxon. Such a conclusion is supported by data presented on qualitative differences in host recognition observed between different host-associated populations of P. novaezelandiae. Conservatively these discontinuities indicate host race development, although a viable alternate hypothesis would be the presence of cryptic, host-specific biological species within P. novaezelandiae. Hostrace development as found here is a well recognised phenomenon in insect-host and parasitoid-host relationships, although little studied in marine symbiotic relationships. Such a phenomenon has important implications for ecological, behavioural and physiological studies on marine symbionts in general.
APA, Harvard, Vancouver, ISO, and other styles
17

Stevens, Peter M. "Host races and cryptic species in marine symbionts." Connect to this title online, 1990. http://hdl.handle.net/2292/2321.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Sanders, Kate L. "Cryptic speciation and biogeography in Indomalayan pitvipers (Trimeresurus)." Thesis, Bangor University, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.402664.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Santin, Selvaggia <1977&gt. "Effects of habitat characteristics on cryptic fish assemblages." Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2008. http://amsdottorato.unibo.it/652/.

Full text
Abstract:
Habitat structure is known to influence the abundance of fishes on temperate reefs. Biotic interactions play a major role in determining the distribution and abundance of species. The significance of these forces in affecting the abundance of fishes may hinge on the presence of organisms that either create or alter habitat. On temperate reefs, for example, macroalgae are considered autogenic ecosystem engineers because they control resource availability to other species through their physical structure and provide much of the structure used by fish. On both coral and temperate reefs, small cryptic reef fishes may comprise up to half of the fish numbers and constitute a diverse community containing many specialized species. Small cryptic fishes (<100 mm total length) may be responsible for the passage of 57% of the energy flow and constitute ca. 35% of the overall reef fish biomass on coral reefs. These benthic fish exploit restricted habitats where food and shelter are obtained in, or in relation to, conditions of substrate complexity and/or restricted living space. A range of mechanisms has been proposed to account for the diversity and the abundance of small fishes: (1) lifehistory strategies that promote short generation times, (2) habitat associations and behaviour that reduce predation and (3) resource partitioning that allows small species to coexist with larger competitors. Despite their abundance and potential importance within reef systems, little is known of the community ecology of cryptic fishes. Specifically on habitat associations many theories suggested a not clear direction on this subject. My research contributes to the development of marine fish ecology by addressing the effects of habitat characteristics upon distribution of cryptobenthic fish assemblages. My focus was on the important shallow, coastal ecosystems that often serve as nursery habitat for many fish and where different type of habitat is likely to both play important roles in organism distribution and survival. My research included three related studies: (1) identification of structuring forces on cryptic fish assemblages, such as physical and biological forcing; (2) macroalgae as potential tools for cryptic fish and identification of different habitat feature that could explain cryptic fish assemblages distribution; (3) canopy formers loss: consequences on cryptic fish and relationship with benthos modifications. I found that: (1) cryptic fish assemblages differ between landward and seaward sides of coastal breakwaters in Adriatic Sea. These differences are explained by 50% of the habitat characteristics on two sides, mainly due to presence of the Codium fragile, sand and oyster assemblages. Microhabitat structure influence cryptic fish assemblages. (2) Different habitat support different cryptic fish assemblages. High heterogeneity on benthic assemblages reflect different fish assemblages. Biogenic components that explain different and diverse cryptic fish assemblages are: anemonia bed, mussel bed, macroalgal stands and Cystoseira barbata, as canopy formers. (3) Canopy forming loss is not relevant in structuring directly cryptic fish assemblages. A removal of canopy forming algae did not affect the structure of cryptic fish assemblages. Canopy formers algae on Conero cliff, does not seem to act as structuring force, probably due to its regressive status. In conclusion, cryptic fish have been shown to have species-specific associations with habitat features relating to the biological and non biological components afforded by fish. Canopy formers algae do not explain cryptic fish assemblages distribution and the results of this study and information from the literature (both from the Mediterranean Sea and elsewhere) show that there are no univocal responses of fish assemblages. Further exanimations on an non regressive status of Cystoseira canopy habitat are needed to define and evaluate the relationship between canopy formers and fish on Mediterranean sea.
APA, Harvard, Vancouver, ISO, and other styles
20

Barlow, Katherine Elisabeth. "Resource partitioning between two cryptic species of Pipistrellus." Thesis, University of Bristol, 1997. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.361107.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Liz, Márcia Raquel Pereira de Almeida e. "Novel function of transthyretin: a cryptic protease activity." Doctoral thesis, Instituto de Ciências Biomédicas Abel Salazar, 2007. http://hdl.handle.net/10216/7170.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Van, Alphen-Stahl Jonathan. "Phylogeograpy of Aphanicercella cassida (Plecoptera : Notonemourida) : cryptic speciation?" Bachelor's thesis, University of Cape Town, 2002. http://hdl.handle.net/11427/25612.

Full text
Abstract:
Stoneflies (Plecoptera) in South Africa are limited to cool pristine mountain streams. This provides them with very limited habitat in which to survive. The species of stonefly studied in this project (Aphanicercella cassida) has a very wide distribution unlike most other species which have a limited range. Of particular interest is a population in Mpumalanga (north of South Africa) which is very disjunct from the other populations of A. cassida found widely in the southwestern Cape. Despite this large geographic distance the insects appear to be morphologically identical to one another. It is believed that there is limited or no gene flow between the northern and southern populations as stoneflies are poor fliers. Molecular analysis of the cytochrome oxidase I gene in the mitochondrial DNA was analysed to see if any genetic differentiation was occurring inspite of the morphological homogeneity. A 557 base pair region was compared across three populations of A. cassida one in Mpumalanga and two in the southwestern Cape. Two congeneric species, A. bullata and A. scutata, were used as outgroups. The findings of this study were quite dramatic. The northern population is extremely different from the southern populations at the molecular level. There is more variation between the two populations of A. cassida than between the two outgroup species and the split between the two disjunct populations displays evidence of an ancient vicariance event. This finding definitely warrants further investigation into whether the population of A. cassida in Mpumalanga is a cryptic species. More sampling has to be done within the studied populations and more populations should be added to the analysis before any definite decision can be made regarding this fascinating emergence of possible cryptic species in South African stoneflies.
APA, Harvard, Vancouver, ISO, and other styles
23

Liz, Márcia Raquel Pereira de Almeida e. "Novel function of transthyretin: a cryptic protease activity." Tese, Instituto de Ciências Biomédicas Abel Salazar, 2007. http://hdl.handle.net/10216/7170.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Lindqvist, Susanne. "Colonic crypt calcium signalling." Thesis, University of East Anglia, 2000. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.327537.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Brodeleau, Guy. "Étude en culture organotypique de la différenciation des cryptes duodénales chez la souris fœtale." Thèse, Université de Sherbrooke, 1987. http://hdl.handle.net/11143/11738.

Full text
Abstract:
Chez la souris, les cryptes intestinales ne se différencient que dans les jours suivants la naissance alors que les villosités sont déjà formées. Nous avons démontré dans ce travail que des extraits de liquide amniotique de rat et de certains organes prélevés chez le rat adulte contiennent un facteur capable d'influencer la différenciation des cryptes (CDF) après 48 heures de culture dans l'intestin de souris foetales de 15 jours avec le milieu T8. Le besoin de quantifier cette activité CDF a mené à l'élaboration d'un essai biologique axé sur la culture organotypique. La quantification a été basée sur le taux de réponse pour une expérience multiplié par le nombre de cryptes dans chaque explant ayant répondu, (la réponse d'un explant étant définie comme la présence d'au moins une crypte sur la coupe examinée); la moyenne donnant l'indice cryptal (IC). A l'aide de cet essai biologique nous avons constaté que le CDF a des propriétés physico-chimiques lui conférant une grande stabilité. Nous avons constaté aussi qu'il était possible de purifier ce facteur et d'en déterminer le poids moléculaire par filtration sur gel. Nous l'avons estimé à environ 13,000 daltons. L'histologie et l'autoradiographie nous ont appris que le CDF permettait la différenciation des cryptes sans exiger la présence de villosité et qu'il permettait de confiner l'activité de synthèse d'ADN aux cryptes précocément formées. Du point de vue physiologique le CDF semble avoir un effet régulateur sur le transport des électrolytes puisque les explants cultivés avec un milieu T8 contenant du CDF et un supplément de NaCl présentaient une muqueuse avec un épithélium et un mésenchyme normal tandis que sans CDF, l'épithélium devenait cubique et le mésenchyme montrait une forte tendance à régresser. L'effet sur la phosphatase alcaline milite aussi en faveur d'un rôle physiologique. L'exploration d'autres organes chez le foetus et l'adulte montre que l'origine présomptive pourrait être la membrane vitelline viscérale (MV) et que cette activité peut être démontrée dans la MV de plusieurs espèces soit le rat, la souris et le sac vitellin humain. Les cellules atypiques qui se retrouvent dans certains explants cultivés en présence de CDF et apparentées morphologiquement aux cellules intermédiaires chez l'adulte apparaissent comme un type cellulaire à part, en se basant sur les propriétés des cellules intermédiaires de l'adulte. Ces cellules pourraient être impliquées dans la formation des cryptes. En conclusion, nous avons démontré, par la culture organotypique de l'intestin de souris foetale, que la formation des cryptes n'est pas reliée à la formation des villosités. Il s'agit donc de deux processus morphogénétiques indépendants. Nous avons démontré aussi que certaines cellules localisées dans la crypte et appelées cellules intermédiaires, constituent un type cellulaire épithélial distinct.
APA, Harvard, Vancouver, ISO, and other styles
26

Walters, Rhodri J. "Ion channel regulation in small intestinal crypts." Thesis, University of Cambridge, 1993. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.318409.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Goodwin, Thomas William. "A crypto-allegorical theory of psychoanalytic reading." Thesis, University of Sheffield, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.522437.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Нікітенко, М. О. "Серверний додаток для криптовалютного гаманця «Crypto Book»". Thesis, Чернігів, 2021. http://ir.stu.cn.ua/123456789/25132.

Full text
Abstract:
Нікітенко, М. О. Серверний додаток для криптовалютного гаманця «Crypto Book» : випускна кваліфікаційна робота : 121 "Інженерія програмного забезпечення" / М. О. Нікітенко ; керівник роботи А. М. Акименко ; НУ "Чернігівська політехніка", кафедра технологій та програмної інженерії. – Чернігів, 2021. – 71 с.<br>Об'єкт розробки являє собою серверну частину додатку для криптовалютного гаманця Crypto Book. Метою розробки є одержання додатку, що значно спрощує роботу додавання, редагування та видалення даних. Крім того, додаток забезпечує синхронізацію з клієнтською частиною. У ході розробки була створена працездатна серверна частина інформаційно- комп'ютерного додатку, складовими частинами якої є: − база даних; − сервер. Виконання роботи проводилося відповідно до поставлених вимог. Подальший розвиток роботи можливо у бік ускладнення бази даних з метою збільшення обсягу збережених даних, ускладнення функціоналу для додатку та створення додаткової вихідної документації. Робота має практичну цінність.<br>The object of development is a server part of the system application for the cryptocurrency wallet Crypto Book. The purpose of the development is to obtain a system that greatly simplifies the work of adding, editing and deleting data. In addition, the system provides synchronization with the client part. During the development, a working server part of the information and computer system was created, the components of which are: – database; – server. The work was performed in accordance with the requirements. Further development of work is possible in the direction of complicating the database in order to increase the amount of stored data, complicate the functionality for the system and create additional source documentation. The work has practical value.
APA, Harvard, Vancouver, ISO, and other styles
29

Witt, Jonathan. "Cryptic amphipod species in the Laurentian Great Lakes Basin." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp01/MQ35946.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Callery, Elizabeth Mary. "Cryptic metamorphosis in the evolution of anuran direct development." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape7/PQDD_0016/NQ45642.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Albrecht, Alexander, and Felix Naumann. "Understanding cryptic schemata in large extract-transform-load systems." Universität Potsdam, 2012. http://opus.kobv.de/ubp/volltexte/2012/6125/.

Full text
Abstract:
Extract-Transform-Load (ETL) tools are used for the creation, maintenance, and evolution of data warehouses, data marts, and operational data stores. ETL workflows populate those systems with data from various data sources by specifying and executing a DAG of transformations. Over time, hundreds of individual workflows evolve as new sources and new requirements are integrated into the system. The maintenance and evolution of large-scale ETL systems requires much time and manual effort. A key problem is to understand the meaning of unfamiliar attribute labels in source and target databases and ETL transformations. Hard-to-understand attribute labels lead to frustration and time spent to develop and understand ETL workflows. We present a schema decryption technique to support ETL developers in understanding cryptic schemata of sources, targets, and ETL transformations. For a given ETL system, our recommender-like approach leverages the large number of mapped attribute labels in existing ETL workflows to produce good and meaningful decryptions. In this way we are able to decrypt attribute labels consisting of a number of unfamiliar few-letter abbreviations, such as UNP_PEN_INT, which we can decrypt to UNPAID_PENALTY_INTEREST. We evaluate our schema decryption approach on three real-world repositories of ETL workflows and show that our approach is able to suggest high-quality decryptions for cryptic attribute labels in a given schema.<br>Extract-Transform-Load (ETL) Tools werden häufig beim Erstellen, der Wartung und der Weiterentwicklung von Data Warehouses, Data Marts und operationalen Datenbanken verwendet. ETL Workflows befüllen diese Systeme mit Daten aus vielen unterschiedlichen Quellsystemen. Ein ETL Workflow besteht aus mehreren Transformationsschritten, die einen DAG-strukturierter Graphen bilden. Mit der Zeit entstehen hunderte individueller ETL Workflows, da neue Datenquellen integriert oder neue Anforderungen umgesetzt werden müssen. Die Wartung und Weiterentwicklung von großen ETL Systemen benötigt viel Zeit und manuelle Arbeit. Ein zentrales Problem ist dabei das Verständnis unbekannter Attributnamen in Quell- und Zieldatenbanken und ETL Transformationen. Schwer verständliche Attributnamen führen zu Frustration und hohen Zeitaufwänden bei der Entwicklung und dem Verständnis von ETL Workflows. Wir präsentieren eine Schema Decryption Technik, die ETL Entwicklern das Verständnis kryptischer Schemata in Quell- und Zieldatenbanken und ETL Transformationen erleichtert. Unser Ansatz berücksichtigt für ein gegebenes ETL System die Vielzahl verknüpfter Attributnamen in den existierenden ETL Workflows. So werden gute und aussagekräftige "Decryptions" gefunden und wir sind in der Lage Attributnamen, die aus unbekannten Abkürzungen bestehen, zu "decrypten". So wird z.B. für den Attributenamen UNP_PEN_INT als Decryption UNPAIN_PENALTY_INTEREST vorgeschlagen. Unser Schema Decryption Ansatz wurde für drei ETL-Repositories evaluiert und es zeigte sich, dass unser Ansatz qualitativ hochwertige Decryptions für kryptische Attributnamen vorschlägt.
APA, Harvard, Vancouver, ISO, and other styles
32

Franceschetti, Marie-Laure. "Mu transduction in vivo with cryptic Mu pac motifs." Thesis, McGill University, 2004. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=81332.

Full text
Abstract:
Mu is a temperate, transposable coliphage with an unusual mode of replication and maturation. Mu is encapsidated linked to host sequences flanking the dispersed, integrated phage genomes. For encapsidation to occur, phage genomes must be recognized and removed from the chromosome. A putative enzyme recognizes the specific pac sequence within Mu left end.<br>The objective of my research is to characterize the influence of selected E. coli sequences on Mu transduction. In transduction the virion prohead is filled up with an important percentage, if not in totality, of host DNA. Cryptic pac sequences are defined as E.coli K12 genomic sequences showing the highest homology with the endogenous Mu pac sequence. Those host sequences could influence Mu packaging process towards transductants rather than "standard" infectious phage particles.<br>Using ClustralW software, two cryptic pac sequences were identified. Transduction assays with cloned cryptic pac sequences give insight into E.coli intrinsic potential to promote transduction.
APA, Harvard, Vancouver, ISO, and other styles
33

Astle, William John. "Population Structure and Cryptic Relatedness in Genetic Association Studies." Thesis, Imperial College London, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.505314.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Chan, Hon-ki, and 陳翰奇. "Phylogeography and cryptic diversity of occidozyga lima (gravenhorst 1829)." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2013. http://hub.hku.hk/bib/B50605835.

Full text
Abstract:
The anuran fauna has been found to harbor substantial cryptic diversity, and chronic, low-level population declines in evolutionarily significant units can be masked by a lack of resolution on this diversity. Numerous species previously believed to be common and widespread have been found to represent cryptic species complexes consisting of distinct genetic lineages with restricted ranges. Most research on cryptic diversity has focused on high elevation areas because they usually harbor higher diversity and levels of endemism; thus cryptic diversity from lowland areas remains poorly understood. This study investigated the population divergence of the pearly-skinned floating frog (Occidozyga lima), a lowland wetland species broadly distributed throughout Southeast Asia and considered common throughout its range. I analyzed six DNA regions (Histone H3, Tyrosinase exon-1, 28S, 16S, ND1 and 12S; a total of 4,650 base pairs) to reconstruct the phylogenetic relationships among populations. Morphometric analyses were conducted to test for morphological differentiation. Both genetic and morphological data revealed substantial lineage divergence in O. lima. I found that sympatric lineages are not sister lineages, a common feature of cryptic species complexes. The current status of O. lima as a single species should be rejected. Three candidate species were delineated based on 5% mitochondrial 16S genetic divergence. The name O. lima should be restricted to populations in the type locality, Java, Indonesia (candidate species I), and two new species should be assigned to populations from South China to Northern Indochina (candidate species II) and Southern Indochina to Myanmar (candidate species III). Resolving the widely-distributed species complex into three valid species requires reassessment of the IUCN conservation status. Given observed population declines in South China and Indonesia, the new species are likely to belong to a higher threat category. Species considered to be common and widespread are under-represented in current conservation planning because conservation priority has been biased toward rare and range-restricted species. Increasing evidence suggests that species whose populations are considered stable are declining at rates exceeding those of rare species. Using habitat availability as a proxy for their occurrence, it appears that the three clades are threatened to varying degrees because of habitat loss. Populations from South China and Indonesia are the most threatened due to massive development of lowland habitats. In addition, conversion of wet agriculture to permanent dry crops and the predicted increases in persistent droughts pose threats to amphibian populations in lowland habitats. The extirpated O. lima populations should be restored in Hong Kong by means of reintroduction. A study of the reproductive ecology of O. lima followed by experimental reintroduction is necessary to restore populations and may serve as a model for public education about amphibian conservation. Given the rapid decline of this species in South China, a reintroduction plan and resources to initiate a reintroduction are urgently needed.<br>published_or_final_version<br>Biological Sciences<br>Master<br>Master of Philosophy
APA, Harvard, Vancouver, ISO, and other styles
35

Joyce, Christine Angela. "Cryptic telomeric rearrangements in individuals with idiopathic mental retardation." Thesis, University of Southampton, 2000. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.340360.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Rush, Cassidi. "Unknown and Cryptic Diversity in the Adelpha serpa-group." Scholarly Commons, 2018. https://scholarlycommons.pacific.edu/uop_etds/3138.

Full text
Abstract:
The tropics are host to incredible insect diversity. One of the most charismatic groups that exhibit this diversity are the butterflies. Despite the tropical butterfly fauna being heavily researched, there remains much hidden diversity in the form of undescribed life histories and cryptic species. This is especially true among the species rich Nymphalidae, the brush-footed butterflies. Species in the genus Adelpha are known to be “the most trying taxonomically of all nymphalids” DeVries (1987), and as such are fruitful ground for uncovering unknown diversity. About half of the species within Adelpha have undescribed life histories, while A. serpa stands out within the genus in having remarkably wide host breadth, and thus potentially harbors cryptic diversity. Here we describe the life histories of two species of Adelpha from Costa Rica, and use an integrative approach to clarify species level boundaries within the Adelpha serpa-group. We conclude that A. serpa does not show significant evidence of harboring cryptic species, and appears to be a geographically widespread species and a hostplant generalist. Three additional species within the serpa-group show strong evidence of harboring cryptic species, and further research should be done to clarify these species relationships.
APA, Harvard, Vancouver, ISO, and other styles
37

McGinley, Susan. "The Diversity Inside: Cryptic Fungi on the Navajo Nation." College of Agriculture and Life Sciences, University of Arizona (Tucson, AZ), 2007. http://hdl.handle.net/10150/622132.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Dreher, Matthew David. "A Crypt within a Dystopia." Thesis, Virginia Tech, 2012. http://hdl.handle.net/10919/32607.

Full text
Abstract:
This project is about our social denial of death, the questioning of rationality and utopian ideals, and our fears of modernity. The intimate connection once associated with death has been hidden. In this project the remains of the dead are sacred. Death is brought to the forefront. By acknowledging a finite existence and exposing our fear of death, life can be given meaning. The activities of daily life are integrally linked to the crypt.<br>Master of Architecture
APA, Harvard, Vancouver, ISO, and other styles
39

Hillerup, Jens Christian. "Crypto analysis and its applications to password hashing." Thesis, KTH, Kommunikationssystem, CoS, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-142651.

Full text
Abstract:
Hash functions are a type of mathematical function that takes an input of arbitrary length and gives an output of fixed length, called a hash value. Many consider hash values to be sort of a “fingerprint” of some data, since they can be assumed to have unique outputs for any possible input. This assumption does not make a lot of sense, because the size of the input space is infinite while the size of the output space remains finite! It is, nevertheless, defensible because of the infeasibility of finding two inputs that yield the same hash value. Hash functions are often used to store passwords in databases since it is not feasible either to go from a hash value to a preimage. By saving the hash value rather than the password and checking the hash value of the user’s input it is possible to check passwords without the need to store them, which is an advantage if one wants to control the damage of a possible data leakage. This work researches different cryptanalytic techniques for searching for preimages to hash values in a password-cracking context. A 27% increase in performance is gained using a time/memory tradeoff instead of naively iterating through password candidates. The attack is also demonstrated in practice, where it attains a 50% improvement. The data is then analyzed and discussed for the purpose of assessing the implementability of the attacks in already existing cracking implementations.
APA, Harvard, Vancouver, ISO, and other styles
40

Tenzin, Kencho. "Shankara a Hindu revivalist or a crypto-Buddhist? /." unrestricted, 2006. http://etd.gsu.edu/theses/available/etd-11302006-094652/.

Full text
Abstract:
Thesis (M.A.)--Georgia State University, 2006.<br>Kathryn McClymond, committee chair; Jonathan Herman, Christopher White, committee members. Electronic text (70 p.) : digital, PDF file. Description based on contents viewed Apr. 20, 2007; title from title screen. Includes bibliographical references (p. 60-61).
APA, Harvard, Vancouver, ISO, and other styles
41

Hodack, David. "Crypto Key Management for a Network Telemetry System." International Foundation for Telemetering, 2012. http://hdl.handle.net/10150/581474.

Full text
Abstract:
ITC/USA 2012 Conference Proceedings / The Forty-Eighth Annual International Telemetering Conference and Technical Exhibition / October 22-25, 2012 / Town and Country Resort & Convention Center, San Diego, California<br>In today's global environment of increasing security threats, good practical key management is becoming increasingly important. This paper will discuss what is involved in key management and will explore key management options for a network based telemetry system. Specifically, the management of the keys used for the iNET radio will be addressed.
APA, Harvard, Vancouver, ISO, and other styles
42

Clavier, Christophe. "De la sécurité physique des crypto-systèmes embarqués." Versailles-St Quentin en Yvelines, 2007. http://www.theses.fr/2007VERS0028.

Full text
Abstract:
Dans un monde défiant, l'augmentation du nombre et de la diversité des applications numériques ont rendu nécessaire l'existence d'un objet pratique intégrant les fonctions cryptographiques requises pour les besoins quotidiens de sécurité des transactions, de confidentialité des échanges, d'identification du porteur ou encore d'authentification pour l'accès à un service. Parmi les dispositifs cryptographiques embarqués aptes à proposer ces fonctionnalités, la carte à puce est certainement le plus utilisé de nos jours. Sa portabilité (un porte-feuille peut en contenir une dizaine) et sa capacité à protéger les données et programmes qu'elle contient contre les attaques intrusives, lui confèrent naturellement sa fonction essentielle de ``bunker'' pour le stockage de clés et l'exécution d'algorithmes cryptographiques dans les usages mobiles nécessitant un haut degré de sécurité. Évidemment nécessaire, la conception de schémas cryptographiques mathématiquement robustes, voire prouvés sûrs dans certains modèles, s'est malgré tout révélée insuffisante depuis la publication en 1996 des premières attaques physiques. Exploitant des vulnérabilités liées à la mise en oeuvre concrète des routines de sécurité et à leur implémentation, ces menaces comprennent l'analyse de canaux auxiliaires permettant d'obtenir de l'information sur l'état interne d'un processus, et l'exploitation de fautes provoquées ouvrant la voie à certaines cryptanalyses autrement impossibles. Cette thèse présente une série de travaux de recherche dans le domaine de la sécurité physique des crypto-systèmes embarqués. Deux parties de ce document sont consacrées à la description de certaines attaques et à l'étude de l'efficacité de possibles contre-mesures. Une troisième partie aborde le domaine particulier, et encore très peu exploré, de l'applicabilité des attaques physiques dans le cas où la fonction cryptographique considérée est en grande partie, voire totalement, inconnue de l'adversaire<br>In a world full of threats, the development of widespread digital applications has led to the need for a practical device containing cryptographic functions that provide the everyday needs for secure transactions, confidentiality of communications, identification of the subject or authentication for access to a particular service. Among the cryptographic embedded devices ensuring these functionalities, smart cards are certainly the most widely used. Their portability (a wallet may easily contain a dozen) and their ability to protect its data and programs against intruders, make it as the ideal ``bunker'' for key storage and the execution of cryptographic functions during mobile usage requiring a high level of security. Whilst the design of mathematically robust (or even proven secure in some models) cryptographic schemes is an obvious requirement, it is apparently insufficient in the light of the first physical attacks that were published in 1996. Taking advantage of weaknesses related to the basic implementation of security routines, these threats include side-channel analysis which obtains information about the internal state of the process, and the exploitation of induced faults allowing certain cryptanalysis to be performed which otherwise would not have been possible. This thesis presents a series of research works covering the physical security of embedded cryptosystems. Two parts of this document are dedicated to the description of some attacks and to a study of the efficiency of conceivable countermeasures. A third part deals with that particular and still mainly unexplored area which considers the applicability of physical attacks when the cryptographic function is, partly or totally, unknown by the adversary
APA, Harvard, Vancouver, ISO, and other styles
43

Shareck, Julie. "Isolation and characterization of a cryptic plasmid from Lactobacillus plantarum." Thesis, McGill University, 2005. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=84072.

Full text
Abstract:
Lactic acid bacteria (LAB), a group of generally recognized as safe (GRAS) organisms that metabolize sugars into primarily lactic acid, have traditionally been used for the fermentation and preservation of various foods and beverages. There is increasing interest in the genetic manipulation of LAB to improve existing characteristics or introduce novel, industrially pertinent phenotypes. However, because these bacteria have food-related applications, their genetic modification requires the use of food-grade genetic engineering tools. LAB plasmids, self-replicating extrachromosomal DNA molecules, can be used to derive food-grade cloning vectors. The rationale of this research was to develop a food-grade cloning vector using a lactobacilli cryptic plasmid and to investigate its cloning and expression properties. The main objectives were to (i) screen Lactobacillus spp. for plasmids, (ii) isolate and characterize a plasmid, and (iii) use the plasmid replicon to construct a cloning vector and express heterologous genes in various hosts. This is the first step in the development of a new family of food-grade cloning vectors for the genetic modification of lactobacilli.
APA, Harvard, Vancouver, ISO, and other styles
44

Mrinalini, ? "Species delimitation and identification in morphologically cryptic Asian pit vipers." Thesis, Bangor University, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.540404.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Blyth, Jennifer Elizabeth. "Sexual conflict and cryptic female mate choice in the Coelopidae." Thesis, University of Leicester, 2005. http://hdl.handle.net/2381/29730.

Full text
Abstract:
This thesis describes a collection of experiments investigating sexual conflict and cryptic female choice in the Coelopidae. An experiment examining the effect of the alphabeta inversion karyotype in C. frigida revealed that male karyotype has no direct influence on male willingness to mate or other mating interactions, however, male size and karyotype have an influence over the female rejection response. There appears to be no clear genetic effect of female karyotype on female rejection behaviour, which leaves the question as to why alphaalpha females are mated with more often, unanswered. Females were found to mate hundreds of times in their lifetimes, making C. frigida an extremely promiscuous species with great potential for post-copulatory sexual selection to occur in this species. Evidence was found for cryptic female choice as females may have the ability to select sperm from within the ejaculate of a single heterokaryotypic male to produce fitter heterokaryotypic offspring. Time interval between copulations and the order of polyandrous copulations with males of different chromosomal karyotypes were found to interact in their effects on P 2values. The mating systems of 5 Australasian coelopids were examined and a comparative analysis of sexually antagonistic co-evolution in 13 coelopids was carried out. Female-mediated sexual conflict appears to have played a role in increasing male size and variation in male size, though large male reluctance to mate may mask evidence for antagonistic co-evolution. ISSRs were found to be a very useful tool in determining genetic variation in C. frigida and the possible future use of this technique in paternity analysis is discussed.
APA, Harvard, Vancouver, ISO, and other styles
46

Sam, Laiju. "Molecular biology of a cryptic dehalogenase from Burkholderia cepacia MBA4." Thesis, Hong Kong : University of Hong Kong, 2000. http://sunzi.lib.hku.hk/hkuto/record.jsp?B21827187.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Mason, James. "Novel methods for interrogating cryptic heterogeneity in pluripotent stem cells." Thesis, University of Sheffield, 2016. http://etheses.whiterose.ac.uk/15290/.

Full text
Abstract:
Human embryonic stem cells display several features of heterogeneity in culture. This heterogeneity is poorly understood and may impair differentiation protocol efficiency. There is increasing evidence that stem cell heterogeneity is dynamic and affects lineage fate decisions whilst cells are still pluripotent. The aim of this project was to develop new approaches for understanding the heterogeneity of cells within the pluripotent stem cell compartment that influences stem cell fate decisions. Understanding the rules governing stem cell heterogeneity would open up opportunities to manipulate these features for the improved application of differentiation protocols or within regular cell culture maintenance. Two novel methods for the interrogation of pluripotent stem cell heterogeneity have been developed in this thesis. The first approach examines pluripotent stem cell dynamics by modelling the population fluctuations of the sensitive pluripotency marker SSEA3 of a pluripotent Embryonal Carcinoma (EC) cell line, NTera2. The model generated explained the heterogeneity dynamics of SSEA3 within NTera2 and in a predictive manner that also revealed candidate substate populations. The second approach developed was the application of Raman spectroscopy for the non-invasive assessment of heterogeneity within and between stem cell populations according to biochemical signatures. These studies showed that a hyperspectral, grid based, approach proved sensitive for examination of cell biochemistry and furthermore, this approach was used to address biological questions. Raman Spectroscopy proved sensitive enough to notice differences between cell lines, between differentiated and undifferentiated cells, between intracellular compartments, and could discriminate between different pluripotent cells associated with differing lineage biases. This work therefore represents a development in both our understanding of pluripotent stem cell dynamics and the potential for using both modelling and Raman spectroscopy to analyse this phenomenon.
APA, Harvard, Vancouver, ISO, and other styles
48

Takahashi, Miwa. "Morphology and ecology of fishery important, cryptic teleosts in Australia." Thesis, Curtin University, 2021. http://hdl.handle.net/20.500.11937/87705.

Full text
Abstract:
Cryptic teleosts pose challenges to accurate species identification due to their similar morphologies which hinders biological, ecological and fishery assessments. I validated the use of cost-effective identification tools using otolith and body morphometry for eleven cryptic teleosts. Inter- and intra-specific partitioning of diet and habitat was identified between the juveniles and adults of cryptic red snappers, using DNA metabarcoding dietary analyses with the custom blocking primers and species distribution modelling.
APA, Harvard, Vancouver, ISO, and other styles
49

Blijham, G. H. "Het geheim van de ontaarde crypt." Maastricht : Maastricht : Maastricht University ; University Library, Maastricht University [Host], 1990. http://arno.unimaas.nl/show.cgi?fid=12939.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Willson, Nicole. "Cryptic secrets : phantoms of the Haitian Revolution in the American imaginary." Thesis, University of East Anglia, 2016. https://ueaeprints.uea.ac.uk/59449/.

Full text
Abstract:
This thesis explores the Haitian Revolution and its multiple assaults upon the American imaginary. These assaults are understood to form part of a traumatic cultural inheritance. It envisages the Haitian Revolution not as one, singular event, but as a complex, multivalent, and polymorphous phenomenon, with a circular, repeating energy. This ‘circular’ revolution is shown to resonate with different ‘American’ anxieties—anxieties regarding race, class, gender, sexuality, creolization, nationhood, and diaspora. Drawing upon Abraham and Torok’s theory of cryptonymy and the ‘transgenerational phantom’, this thesis traces the roots of these revolutionary traumas (or ‘phantoms’) and uncovers the ‘encrypted’ secrets that underlie the multiple layers of myth, obfuscation, and silence that characterize American representations of Haiti—secrets which reflect both the limits of Haiti’s continual revolutionary power, and the transgenerational force of American cultural anxiety. Using the American gothic tradition as a discursive springboard, this thesis sees fiction, and the creative arts more broadly, as an archive of creative possibilities. Examining a range of gothic ‘texts’ from the 1790s to the 1930s, including Herman Melville’s ‘Benito Cereno’, William Faulkner’s Absalom, Absalom!, Charles Brockden Brown’s Arthur Mervyn, George Washington Cable’s The Grandissimes, and the Halperin brothers’ film White Zombie, it demonstrates the endurance of particular social, political, and cultural anxieties that are often occluded by the conventional American archive. In this sense, it responds to the concerns of Haiti scholars such as Michel-Rolph Trouillot, who have highlighted the limitations of the western archive, and confronts the need to read ‘beyond’ the text, using an assemblage of other sources that may offer clues into ‘encrypted’ histories. In so doing, it does not propose to offer a solution to Haiti’s historical erasure, but demonstrates the unimagined revolutionary possibilities of creative interdisciplinarity.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography