Learn More
PURPOSE To evaluate the effect of Er,Cr:YSGG laser treatment on microshear bond strength of zirconia to resin cement before and after sintering. MATERIALS AND METHODS Ninety pre-sintered yttrium-stabilized tetragonal zirconia specimens (4 × 3 × 2 mm) were divided into 6 groups (n = 15). In group C, sintered zirconia was not treated (control group). In(More)
We study the problem of unconditionally secure Secret Key Establishment (SKE) when Alice and Bob are connected by two noisy channels that are eavesdropped by Eve. We consider the case that Alice and Bob do not have any sources of initial randomness at their disposal. We start by discussing special cases of interest where SKE is impossible and then provide a(More)
INTRODUCTION Recent investigations have revealed that control of hyperglycaemia with insulin improves outcomes. The cornerstone of hyperglycaemia in critically ill patients is insulin resistance and it remains refractory to intensive insulin protocols. We designed this study to evaluate the efficacy and safety of a new intensive insulin therapy (IIT)(More)
INTRODUCTION To analyze the push-out bond strength of Angelus WMTA (Angelus Dental Products), a nano-modification of WMTA (Kamal Asgar Research Center) and Bioaggregate (Innovative Bioceramix). METHODS Sixty 2-mm-thick root sections were prepared from 60 single-rooted human teeth. The dentin disks were randomly divided into three groups (n = 20) and(More)
A Lift Dispatching System (LDS) is a typical real-time system that is highly complicated in design and implementation. This article presents the formal design, specification, and modeling of the LDS system using a denotational mathematics known as Real-Time Process Algebra (RTPA). The conceptual model of the LDS system is introduced as the initial(More)
This paper describes the attack on SOSEMANUK, one of the stream ciphers proposed at eSTREAM (the ECRYPT Stream Cipher Project) in 2005. The cipher features the variable secret key length from 128-bit up to 256-bit and 128-bit initial vector. The basic operation of the cipher is performed in a unit of 32 bits i.e. “word”, and each word generates keystream.(More)
We consider the problem of secret key establishment (SKE) in the presence of a passive adversary, Eve, when Alice and Bob are connected by a pair of independent discrete memoryless broadcast channels in opposite directions. We refer to this setup as 2DMBC. We define the secret-key capacity in this setup and provide a lower bound on the capacity by proposing(More)
We consider the problem of distance bounding verification (DBV), where a proving party claims a distance and a verifying party ensures that the prover is within the claimed distance. Current approaches to “secure” distance estimation use signal’s time of flight, which requires the verifier to have an accurate clock. We study secure DBV using physical(More)