نتایج جستجو برای: identity like
تعداد نتایج: 761739 فیلتر نتایج به سال:
This document specifies an Extensible Authentication Protocol (EAP) mechanism for authentication and session key distribution using the Universal Mobile Telecommunications System (UMTS) Authentication and Key Agreement (AKA) mechanism. UMTS AKA is based on symmetric keys, and runs typically in a UMTS Subscriber Identity Module, a smart card like device. EAP AKA includes optional identity privac...
In this study, we define third order bronze Fibonacci quaternions. We obtain the generating functions, Binet's formula and some properties of these give d'Ocagne's-like Cassini's-like identity use q-determinants for quaternionic matrices to Cassini's
Abstract In this paper, we offer a new quantum integral identity, the result is then used to obtain some estimates of Hermite–Hadamard inequalities for integrals. The results presented in paper are generalizations comparable literature on inequalities. Several inequalities, such as midpoint-like inequality, Simpson-like averaged midpoint–trapezoid-like and trapezoid-like obtained special cases ...
At EUROCRYPT’88, we introduced an interactive zero-howledge protocol ( G ~ O U and Quisquater [13]) fitted to the authentication of tamper-resistant devices (e.g. smart cads , Guillou and Ugon [14]). Each security device stores its secret authentication number, an RSA-like signature computed by an authority from the device identity. Any transaction between a tamperresistant security device and ...
Using communication services is a common part of everyday life in a personal or business context. Communication services include Internet services like voice services, chat service, and web 2.0 technologies (wikis, blogs, etc), but other usage areas like home energy management and eMobility are will be increasingly tackled. Such communication services typically authenticate participants. For th...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید