Cryptography and Information Protection in the Living World
暂无分享,去创建一个
Naya Nagy | Marius Nagy | Paul Hodor | P. Hodor | Naya Nagy | Marius Nagy
[1] Elizabeth A. Shephard,et al. Cell Biology: A Short Course , 2003 .
[2] Jack P. Hailman,et al. Mimicry in plants and animals , 1969 .
[3] H. Nakayashiki. The Trickster in the genome: contribution and control of transposable elements , 2011, Genes to cells : devoted to molecular & cellular mechanisms.
[4] S. Broyde,et al. The Chemical Biology of DNA Damage , 2010 .
[5] M. Hauber. Lower begging responsiveness of host versus parasitic brown-headed cowbird (Molothrus ater) nestlings is related to species identity but not to early social experience. , 2003, Journal of comparative psychology.
[6] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[7] Mary K. Lewinski,et al. Retroviral DNA integration--mechanism and consequences. , 2005, Advances in genetics.
[8] A. Campbell. Phage integration and chromosome structure. A personal history. , 2007, Annual review of genetics.
[9] W. Cary Huffman,et al. Fundamentals of Error-Correcting Codes , 1975 .
[10] Julie A. Law,et al. Establishing, maintaining and modifying DNA methylation patterns in plants and animals , 2010, Nature Reviews Genetics.