نتایج جستجو برای: private key search

تعداد نتایج: 913761  

Introduction: Evaluation of pharmaceutical systems performance is an essential prerequisite for promoting evidence-based policy-making, improvement in health system performance. This study attempts to evaluate the performance of Iran pharmaceutical system based on the world health organization (WHO)'s indicators, including access, quality, and rational use of medicines. Methods: In this c...

The health sector, a foremost service sector in Nigeria, faces a number of challenges; primarily, the persistent under-funding of the health sector by the Nigerian government as evidence reveals low allocations to the health sector and poor health system performance which are reflected in key health indices of the country.Notwithstanding, there is evidence that the private sector could be a key...

Journal: :IEICE Transactions 2006
Noboru Kunihiro Wataru Abe Kazuo Ohta

In 1984, Shamir first introduced the concept of ID-based cryptosystems [1]. Although various schemes have been proposed after his proposal, we may say that the only bilinear map based schemes [2], [3] are practical. In this letter, we examine the realizability of the other scheme: Maurer-Yacobi key distribution scheme [4]. In this scheme, a user’s private key is generated by solving Discrete Lo...

Journal: :IACR Cryptology ePrint Archive 2011
Gu Chunsheng

We introduce a new concept, called multiplicative learning with errors (MLWE), which is a corresponding multiplicative version of the additive learning with errors (LWE), and show the equivalence between the decisional version and the search version for MLWE such that p is a product of sufficiently large smoothing prime factors. Then we construct the MLWE-based private-key and public-key encryp...

Introduction: Evaluation of pharmaceutical systems performance is an essential prerequisite for promoting evidence-based policy-making, improvement in health system performance. This study attempts to evaluate the performance of Iran pharmaceutical system based on the world health organization (WHO)'s indicators, including access, quality, and rational use of medicines. Methods: In this c...

2002
Rodrigo Blanco Rincon Günter Schäfer

Wireless LANs, like the IEEE 802.11 WLANs, are more vulnerable than their wired counterparts. The IEEE 802.11 specification includes an encryption protocol, WEP (Wired Equivalent Protocol), but this protocol inhibits severe weaknesses: there is no automatic key distribution protocol and WEP’s security itself has been shown to be seriously flawed. As a result, many of today’s IEEE 802.11 network...

2002
Christos Xenakis Lazaros F. Merakos

A dynamic network-based Virtual Private Network (VPN) deployment, which is established between the General Packet Radio Services (GPRS) border gateway and a corporate Intranet gateway, is presented and analyzed. By relying on a sequence of concatenated protection mechanisms (GPRS ciphering and VPN deployment), it is possible to provide secure remote access to mobile users without requiring an e...

Journal: :مدیریت بازرگانی 0
رضا پیرایش استادیار گروه مدیریت، دانشگاه زنجان، ایران وحیده علی پور استادیار گروه مدیریت، دانشگاه زنجان، ایران

this study was conducted to assess comparative examination of relationship between competitive intelligence with marketing effectiveness. for this purpose 110 branches managers of private and public banks in zanjan province were selected by stratified random sampling. the instrument of study were competitive intelligence (fahey, 2007) marketing effectiveness (kotler, 1997). results indicated th...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید