276 results on '"Dutta, Avijit"'
Search Results
2. Tight Security Bound of
3. On the Security of Triplex- and Multiplex-Type Constructions with Smaller Tweaks
4. BBB security for 5-round even-Mansour-based key-alternating Feistel ciphers
5. Optimizing the Application Timing of Liquid Organic Formulations and Their Effect on Sustainable Cowpea Production in Soils of Eastern Indian Plateau
6. Targeting influenza A virus by splicing inhibitor herboxidiene reveals the importance of subtype-specific signatures around splice sites
7. PAE: Towards More Efficient and BBB-Secure AE from a Single Public Permutation
8. Proof of Mirror Theory for a Wide Range of
9. Proof of Mirror Theory for a Wide Range of $$\xi _{\max }$$
10. Multi-user BBB security of public permutations based MAC
11. INT-RUP Security of SAEB and TinyJAMBU
12. Effect of [6]-gingerol on viral neuraminidase and hemagglutinin-specific T cell immunity in severe influenza
13. CENCPP∗: beyond-birthday-secure encryption from public permutations
14. Minimizing the Two-Round Tweakable Even-Mansour Cipher
15. BBB Secure Nonce Based MAC Using Public Permutations
16. Spa Typing and Virulence Attributes of Multidrug-Resistant Staphylococcus aureus in Goat: A Veterinary Hospital-Based Cross-Sectional Study
17. Cascading Four Round LRW1 is Beyond Birthday Bound Secure
18. Management of E-resources in Academic Libraries: Some observations
19. $\textsf{LightMAC}$: Fork it and make it faster.
20. Information Retrieval Techniques Used by the Midnapore College (Autonomous) Library Users: A Study
21. Beyond Birthday Bound Secure MAC in Faulty Nonce Model
22. BBB security for 5-round even-Mansour-based key-alternating Feistel ciphers
23. Colistin Resistance in Multidrug-Resistant Escherichia coli Isolated from Retail Broiler Meat in Bangladesh
24. Relatively preserved functional immune capacity with standard COVID-19 vaccine regimen in people living with HIV
25. Secure Proof of Ownership Using Merkle Tree for Deduplicated Storage
26. Digital Security: An Enigma
27. Encrypt or Decrypt? To Make a Single-Key Beyond Birthday Secure Nonce-Based MAC
28. Tweakable HCTR: A BBB Secure Tweakable Enciphering Scheme
29. Polymorphism of fecundity genes (BMP15 and GDF9) and their association with litter size in Bangladeshi prolific Black Bengal goat
30. Impact of antimicrobial use on abundance of antimicrobial resistance genes in chicken flocks in Vietnam
31. Minimizing the Two-Round Tweakable Even-Mansour Cipher
32. BBB Secure Nonce Based MAC Using Public Permutations
33. The Iterated Random Function Problem
34. Murine cytotoxic CD4+ T cells in the tumor microenvironment are at a hyper-maturation stage of Th1 CD4+ T cells sustained by IL-12
35. Anti-PPIL-5 antibody exacerbates disease of severe influenza in a murine experimental model
36. Th1-guided de novoTh17 response alleviates lung inflammation through IL-17-EGFR-TRAF4 signaling cascade in severe influenza
37. Relatively preserved functional capacity with standard COVID-19 vaccine regimen in People Living with HIV asymptomatic or with mild immunodeficiency
38. Supplementary Figure 4 from Tumor-Derived Chemokine CCL5 Enhances TGF-β–Mediated Killing of CD8+ T Cells in Colon Cancer by T-Regulatory Cells
39. Data from Tumor-Derived Chemokine CCL5 Enhances TGF-β–Mediated Killing of CD8+ T Cells in Colon Cancer by T-Regulatory Cells
40. Supplementary Figure 1 from Tumor-Derived Chemokine CCL5 Enhances TGF-β–Mediated Killing of CD8+ T Cells in Colon Cancer by T-Regulatory Cells
41. Supplementary Figure Legends 1-4 from Tumor-Derived Chemokine CCL5 Enhances TGF-β–Mediated Killing of CD8+ T Cells in Colon Cancer by T-Regulatory Cells
42. Supplementary Figure 3 from Tumor-Derived Chemokine CCL5 Enhances TGF-β–Mediated Killing of CD8+ T Cells in Colon Cancer by T-Regulatory Cells
43. Supplementary Figure 2 from Tumor-Derived Chemokine CCL5 Enhances TGF-β–Mediated Killing of CD8+ T Cells in Colon Cancer by T-Regulatory Cells
44. Tight Multi-User Security Bound of DbHtS
45. One-Key Compression Function Based MAC with Security Beyond Birthday Bound
46. Relatively preserved functional immune capacity with standard COVID-19 vaccine regimen in people living with HIV.
47. Beyond Birthday Bound Secure MAC in Faulty Nonce Model
48. The origin of regulatory from the effector cells in LAG‐3‐marked Th1 immunity against severe influenza virus infection
49. Deterministic Hard Fault Attack on Trivium
50. Tweakable HCTR: A BBB Secure Tweakable Enciphering Scheme
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.