Learn More
Mutual authentication is vital concept to network security and incorporated to proprietary security solutions. In this paper, we present a new mutual authentication protocol based on graph isomorphism that can stop man-in-the-middle, session high-jacking and replay attacks. Although authentication protocol based on graph isomorphism was motivated by WLAN(More)
Graph isomorphism has received considerable attention because of many of the practical applications of the problem. Also, researchers have not yet been able to discover where the graph isomorphism problem fits into the NP complexity model. In this paper, we establish necessary conditions for graph isomorphism problem. Based on these conditions, algorithms(More)
A novel series of combretastatin A-4 heterocyclic analogues was prepared by replacement of the B ring with indole, benzofurane or benzothiophene, attached at the C2 position. These compounds were evaluated for their abilities to inhibit tubulin assembly: derivative cis3b, having a benzothiophene, showed an activity similar to those of colchicine or(More)
Dental caries can be described as a dysbiosis of the oral microbial community, in which acidogenic, aciduric, and acid-adapted bacterial species promote a pathogenic environment, leading to demineralization. Alkali generation by oral microbes, specifically via arginine catabolic pathways, is an essential factor in maintaining plaque pH homeostasis. There is(More)
BACKGROUND Limited data are available on HIV viral suppression rates among men and women on antiretroviral therapy (ART) and factors associated with HIV RNA viral load (VL) suppression in Vietnam. METHODS We conducted a cross-sectional survey of 1255 adult patients on ART for at least 1 year across four provinces in Vietnam. Data collection included a(More)
  • 1