نتایج جستجو برای: private key search
تعداد نتایج: 913761 فیلتر نتایج به سال:
Introduction: Evaluation of pharmaceutical systems performance is an essential prerequisite for promoting evidence-based policy-making, improvement in health system performance. This study attempts to evaluate the performance of Iran pharmaceutical system based on the world health organization (WHO)'s indicators, including access, quality, and rational use of medicines. Methods: In this c...
The health sector, a foremost service sector in Nigeria, faces a number of challenges; primarily, the persistent under-funding of the health sector by the Nigerian government as evidence reveals low allocations to the health sector and poor health system performance which are reflected in key health indices of the country.Notwithstanding, there is evidence that the private sector could be a key...
In 1984, Shamir first introduced the concept of ID-based cryptosystems [1]. Although various schemes have been proposed after his proposal, we may say that the only bilinear map based schemes [2], [3] are practical. In this letter, we examine the realizability of the other scheme: Maurer-Yacobi key distribution scheme [4]. In this scheme, a user’s private key is generated by solving Discrete Lo...
We introduce a new concept, called multiplicative learning with errors (MLWE), which is a corresponding multiplicative version of the additive learning with errors (LWE), and show the equivalence between the decisional version and the search version for MLWE such that p is a product of sufficiently large smoothing prime factors. Then we construct the MLWE-based private-key and public-key encryp...
Introduction: Evaluation of pharmaceutical systems performance is an essential prerequisite for promoting evidence-based policy-making, improvement in health system performance. This study attempts to evaluate the performance of Iran pharmaceutical system based on the world health organization (WHO)'s indicators, including access, quality, and rational use of medicines. Methods: In this c...
Wireless LANs, like the IEEE 802.11 WLANs, are more vulnerable than their wired counterparts. The IEEE 802.11 specification includes an encryption protocol, WEP (Wired Equivalent Protocol), but this protocol inhibits severe weaknesses: there is no automatic key distribution protocol and WEP’s security itself has been shown to be seriously flawed. As a result, many of today’s IEEE 802.11 network...
A dynamic network-based Virtual Private Network (VPN) deployment, which is established between the General Packet Radio Services (GPRS) border gateway and a corporate Intranet gateway, is presented and analyzed. By relying on a sequence of concatenated protection mechanisms (GPRS ciphering and VPN deployment), it is possible to provide secure remote access to mobile users without requiring an e...
this study was conducted to assess comparative examination of relationship between competitive intelligence with marketing effectiveness. for this purpose 110 branches managers of private and public banks in zanjan province were selected by stratified random sampling. the instrument of study were competitive intelligence (fahey, 2007) marketing effectiveness (kotler, 1997). results indicated th...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید