نتایج جستجو برای: authentication data structure

تعداد نتایج: 3694940  

2007
Pedro Comesaña Alfaro Félix Balado Fernando Pérez-González

This work deals with practical and theoretical issues raised by the information-theoretical framework for authentication with distortion constraints proposed by Martinian et al. The optimal schemes proposed by these authors rely on random codes which bear close resemblance to the dirty-paper random codes which show up in data hiding problems. On the one hand, this would suggest to implement pra...

Journal: :Technium 2023

Abstract: The requirement for data interchange, access, and retrieval from diverse databases. This is getting more crucial. However, retrieving this a heterogeneous database necessitates juggling many kinds of query languages, models, structure. goal project to create unified access control approach (UACA), which will be managed by service object (SDO) technologies based on an agent mechanism a...

2013

The false data injection attack is a major security threat in Wireless Sensor Network (WSN) since is degrades the network capability. The bandwidth efficient cooperative authentication (BECAN) scheme is used for filtering the false data injection attack. It is used to save energy of sensor nodes in WSN by early detection and filtering of maximum possible injected false data. Source authenticati...

2008
Geoff Skinner

Digital Collaborations are proving themselves as ideal environments for increasing the productivity and knowledge exploration capabilities of their members. Many organizations are realizing the diverse range of benefits they provide to not only their organization as a whole but also to individual employees. The challenge in environments that encourage the sharing of resources, in particular dat...

Journal: :Mobile Information Systems 2011
Yi-Fu Ciou Fang-Yie Leu Yi-Li Huang Kangbin Yim

In this paper, we propose a handover authentication mechanism, called the handover key management and authentication scheme (HaKMA for short), which as a three-layer authentication architecture is a new version of our previous work, the Diffie-Hellman-PKDS-based authentication method (DiHam for short), improving its key generation flow and adding a handover authentication scheme to respectively...

2002
Petros Maniatis Mary Baker

A secure timeline is a tamper-evident historic record of the states through which a system goes throughout its operational history. Secure timelines can help us reason about the temporal ordering of system states in a provable manner. We extend secure timelines to encompass multiple, mutually distrustful services, using timeline entanglement. Timeline entanglement associates disparate timelines...

2016
Nikola Milosevic Cassie Gregson Robert Hernandez Goran Nenadic

Within the scientific literature, tables are commonly used to present factual and statistical information in a compact way, which is easy to digest by readers. The ability to "understand" the structure of tables is key for information extraction in many domains. However, the complexity and variety of presentation layouts and value formats makes it difficult to automatically extract roles and re...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید