Learn More
Both eyes of flatfishes are located on one side of the body due to asymmetrical eye migration. The molecular mechanisms underlying such asymmetry is poorly understood. As an initial step, we have adopted suppression subtractive hybridization for the identification of upregulated genes during metamorphosis involving eye migration in Japanese flounder,(More)
Impossible differential cryptanalysis is a method recovering secret key by getting rid of the keys that satisfy impossible differential relations. This cryptanalysis has been used to attack AES and many good results were gotten. For the new block cipher ARIA is similar to AES in structure, it is necessary to research its security against impossible(More)
Workflow Management System is used for supporting many day-to-day workflows in large organizations. But heterogeneous and distributed computing systems make security management of WFMS decentralized, thus its security must be noticed. In this paper, we propose a role-based secure workflow model which realizes the principle of separation of duties (SoD), the(More)
  • 1