نتایج جستجو برای: authentication data structure
تعداد نتایج: 3694940 فیلتر نتایج به سال:
This work deals with practical and theoretical issues raised by the information-theoretical framework for authentication with distortion constraints proposed by Martinian et al. The optimal schemes proposed by these authors rely on random codes which bear close resemblance to the dirty-paper random codes which show up in data hiding problems. On the one hand, this would suggest to implement pra...
Abstract: The requirement for data interchange, access, and retrieval from diverse databases. This is getting more crucial. However, retrieving this a heterogeneous database necessitates juggling many kinds of query languages, models, structure. goal project to create unified access control approach (UACA), which will be managed by service object (SDO) technologies based on an agent mechanism a...
The false data injection attack is a major security threat in Wireless Sensor Network (WSN) since is degrades the network capability. The bandwidth efficient cooperative authentication (BECAN) scheme is used for filtering the false data injection attack. It is used to save energy of sensor nodes in WSN by early detection and filtering of maximum possible injected false data. Source authenticati...
Digital Collaborations are proving themselves as ideal environments for increasing the productivity and knowledge exploration capabilities of their members. Many organizations are realizing the diverse range of benefits they provide to not only their organization as a whole but also to individual employees. The challenge in environments that encourage the sharing of resources, in particular dat...
In this paper, we propose a handover authentication mechanism, called the handover key management and authentication scheme (HaKMA for short), which as a three-layer authentication architecture is a new version of our previous work, the Diffie-Hellman-PKDS-based authentication method (DiHam for short), improving its key generation flow and adding a handover authentication scheme to respectively...
A secure timeline is a tamper-evident historic record of the states through which a system goes throughout its operational history. Secure timelines can help us reason about the temporal ordering of system states in a provable manner. We extend secure timelines to encompass multiple, mutually distrustful services, using timeline entanglement. Timeline entanglement associates disparate timelines...
Within the scientific literature, tables are commonly used to present factual and statistical information in a compact way, which is easy to digest by readers. The ability to "understand" the structure of tables is key for information extraction in many domains. However, the complexity and variety of presentation layouts and value formats makes it difficult to automatically extract roles and re...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید