نتایج جستجو برای: 18911001891100total increase in man

تعداد نتایج: 17012179  

Journal: :IACR Cryptology ePrint Archive 2016
Mathilde Igier Serge Vaudenay

Distance Bounding (DB) is designed to mitigate relay attacks. This paper provides a complete study of the DB protocol of Kleber et al. based on Physical Unclonable Functions (PUFs). We contradict the claim that it resists to Terrorist Fraud (TF). We propose some slight modifications to increase the security of the protocol and formally prove TF-resistance, as well as resistance to Distance Frau...

Journal: :caspian journal of environmental sciences 2013
s. ehsan a.r. atarodi* m. kianmehr

gradual increase of the earth's surface temperature can cause many significant changes on the climate of our planet. this problem is progressively increasing. one of the main reasons for this phenomenon is the absorption of the sun's energy and lack of proper reflection of emissions due to man-made activities, one of which is the increase in black surfaces. in this descriptive and cross-section...

Journal: :avicenna journal of clinical microbiology and infection 0
fariba keramat brucellosis research center, hamadan university of medical sciences, hamadan, ir iran seyyed hamid hashemi brucellosis research center, hamadan university of medical sciences, hamadan, ir iran; brucellosis research center, hamadan university of medical sciences, hamadan, ir iran. tel: +98-8138272154

introduction brucellosis is a common zoonotic disease which has a wide spectrum of clinical manifestations and complications in humans. brucellosis is an endemic disease in iran. the aim of this case report was to introduce acute hepatitis as a rare complication of acute brucellosis. case presentation first case, a 25-year-old man, who complained from fever, chillness, nocturnal sweating, nause...

2013
Hailin Chen Zuping Zhang

Increasing evidence has revealed that microRNAs (miRNAs) play important roles in the development and progression of human diseases. However, efforts made to uncover OMIM disease-miRNA associations are lacking and the majority of diseases in the OMIM database are not associated with any miRNA. Therefore, there is a strong incentive to develop computational methods to detect potential OMIM diseas...

1995
Christian Gehrmann

Gemmell and Naor proposed a new protocol for unconditionally secure authentication of long messages. However Gehrmann showed that the proof of the security of the protocol was incorrect. Here we generalize the multiround protocol model. We prove the security of a 3-round protocol and give for this case a new easy implementable construction which has a key size close to the fundamental lower bou...

1964
F. A. GIFFORD

Study of all reported instances of motion of Martian yellow clouds yields a n analysis of thcir probable nature and properties. The yellow clouds seem to be initiated by wind-driven sand and teiid to form in low latitudes. The limb and terminator projections seem to be quite diffcreiit in nature, probably in par t aqucous condensations. Thcse occur primarily in middle latitudes.

Journal: :Des. Codes Cryptography 2007
Alexandre Pinto André Souto Armando Matos Luis Filipe Coelho Antunes

In the present paper, we answer a question raised in the paper Constructions and Bounds for Unconditionally Secure Non-Interactive Commitment Schemes, by Blundo et al, 2002, showing that there is a close relation between unconditionally secure commitment schemes and unconditionally secure authentication schemes, and that an unconditionally secure commitment scheme can be built from such an auth...

1995
Kaoru Kurosawa Satoshi Obana

Unconditionally secure authentication codes with arbitration (A 2 -codes) protect against deceptions from the transmitter and the receiver as well as that from the opponent. In this paper, we present combinatorial lower bounds on the cheating probabilities for A 2 -codes in terms of the number of source states, that of the whole messages and that of messages which the receiver accepts as authen...

2015
Ashish Kumar

.................................................................................. iii TABLE OF CONTENTS................................................................... iv LIST OF FIGURES......................................................................... vii LIST OF TABLES........................................................................... viii

Journal: :I. J. Network Security 2008
Min-Ho Kim Çetin Kaya Koç

Novikov and Kiselev [7] proposed an authentication method of a user from a remote autonomous object. Recently, Yang et al. [12] and Awasthi [1] have pointed out that the Novikov-Kiselev scheme is insecure against the man-in-the-middle attack. In this article, we propose an improved version of the Novikov-Kiselev scheme to overcome such vulnerability.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید