نتایج جستجو برای: identity like

تعداد نتایج: 761739  

2001
H. Haverinen

This document specifies an Extensible Authentication Protocol (EAP) mechanism for authentication and session key distribution using the Universal Mobile Telecommunications System (UMTS) Authentication and Key Agreement (AKA) mechanism. UMTS AKA is based on symmetric keys, and runs typically in a UMTS Subscriber Identity Module, a smart card like device. EAP AKA includes optional identity privac...

Journal: :Turkish journal of mathematics & computer science 2022

In this study, we define third order bronze Fibonacci quaternions. We obtain the generating functions, Binet's formula and some properties of these give d'Ocagne's-like Cassini's-like identity use q-determinants for quaternionic matrices to Cassini's

Journal: :Advances in Difference Equations 2021

Abstract In this paper, we offer a new quantum integral identity, the result is then used to obtain some estimates of Hermite–Hadamard inequalities for integrals. The results presented in paper are generalizations comparable literature on inequalities. Several inequalities, such as midpoint-like inequality, Simpson-like averaged midpoint–trapezoid-like and trapezoid-like obtained special cases ...

1988
Louis C. Guillou Jean-Jacques Quisquater

At EUROCRYPT’88, we introduced an interactive zero-howledge protocol ( G ~ O U and Quisquater [13]) fitted to the authentication of tamper-resistant devices (e.g. smart cads , Guillou and Ugon [14]). Each security device stores its secret authentication number, an RSA-like signature computed by an authority from the device identity. Any transaction between a tamperresistant security device and ...

Journal: :CoRR 2011
Rainer Falk Steffen Fries Hans-Joachim Hof

Using communication services is a common part of everyday life in a personal or business context. Communication services include Internet services like voice services, chat service, and web 2.0 technologies (wikis, blogs, etc), but other usage areas like home energy management and eMobility are will be increasingly tackled. Such communication services typically authenticate participants. For th...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید