نتایج جستجو برای: ident
تعداد نتایج: 404 فیلتر نتایج به سال:
This paper describes an identification and authentication protocol for RFID tags with two contributions aiming at enhancing the security and privacy of RFID based systems. First, we assume that some of the servers storing the information related to the tags can be compromised. In order to protect the tags from potentially malicious servers, we devise a technique that makes RFID identification s...
With the ident i ty fraud in o u r society reaching u n precedented proportions and wi th a n increasing emphas i s o n the emerging automat ic posit ive personal ident i f ication applications, biometrics-based identif ication, especially fingerprint-based identif ication, i s receiving a lot of a t ten t ion . There are t w o m a j o r shortcomings of t he traditional approaches t o f ingerpr...
A numerical rat ing system to del ineate crown classes of southern hardwoods is described. The system is bused on four cri ter ia: (I) amount o f direct sunlightfrom above, (2) amount of direct sunlightfrom the s ides, (3) crown balance, and (4) relat ive crown size . The total point value assigned places the tree within one o f the,four crown classes . The rat ing system can be used to train i...
— This paper presents a magnetic circuit modeling of closed loop Hall-effect current sensors based on a magnetic equivalent circuit which could be simulated with a circuit type simulator software (PSPICE model). First, the principle of measurement of the closed loop Hall-effect current sensors is presented, Then, the magnetic equivalent circuit (MEC) modeling justified by the engineers' model n...
A challenge-response identification protocol is introduced, based on the intractability of the word problem in some Coxeter groups. A Prover builds his public key as the set of leaves of a tree in the Cayley graph of a Coxeter group, and the tree itself is his private keys. Any challenge posed by a Verifier consists of a subset of the public key, and the Prover shows his knowledge of the privat...
On occasion, a patient may have two or more clinical cultures yielding a coagulase-negative staphylococcus If these multiple isolates have the same phenotype, one might conclude that the same strain was reisolated from the patient, indicating its persistent and pathological presence. We examined the validity of this conclusion when we applied a number of characterizing systems to a collection o...
specialist opinions was such as to enrage the medical establishment, why did not paediatricians emerge to supply that demand? Perhaps the GPs already had too firm a grip on the family, while the hospital staff, recruited from the teaching hospitals' high-flying physicians, had, unlike the Germans and Americans, little experience of infants and preferred to move on to the adults. Dr Lomax has no...
The Fiat-Shamir (FS) transform is a popular tool to produce particularly efficient digital signature schemes out of identification protocols. It is known that the resulting signature scheme is secure (in the random oracle model) if and only if the identification protocol is secure against passive impersonators. A similar results holds for constructing ID-based signature schemes out of ID-based ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید