نتایج جستجو برای: tls
تعداد نتایج: 3171 فیلتر نتایج به سال:
The use of Nepomnjaščǐi’s Theorem in the proofs of independence results for bounded arithmetic theories is investigated. Using this result and similar ideas, the following statements are proven: (1) At least one of S1 or TLS does not prove the Matiyasevich-Davis-RobinsonPutnam Theorem and (2) TLS does not prove Σ̂1,1 = Π̂ b 1,1. Here S1 is a conservative extension of the well-studied theory I∆0 a...
Using the model of interaction between two-level systems (TLS) and strain fields introduced in Phys. Rev. B 75, 064202 (2007), we calculate the TLS-TLS interaction. We particularize our calculations to amorphous materials and analyze the dependence of the interaction Hamiltonian on the orientations of the two TLSs and of the direction that connects them. Assuming isotropic distribution of the T...
Tumor Lysis Syndrome (TLS) is a well-known complication of induction therapy for hematologic malignancies. It is characterized by rapid breakdown of malignant white blood cells (WBCs) leading to metabolic derangements and serious morbidity if left untreated. Most commonly, TLS is triggered by systemic chemotherapy, however, there have been case reports of TLS following intrathecal (IT) chemothe...
There is recent interest in exploring SNMP/TCP in addition to the current use of SNMP/UDP due to performance benefits for bulk transfer as well as to simplify management applications. If SNMP is implemented over TCP, then TLS is a natural choice for security. However, it must be demonstrated that the additional overhead associated with TLS is not excessive. We show this by implementing SNMP on ...
Many SSL/TLS-based e-commerce applications employ traditional authentication mechanisms on the client side. These mechanisms—if decoupled from SSL/TLS session establishment—are vulnerable to man-in-the-middle attacks. In this article, we examine the feasibility of such attacks, survey countermeasures, and explain the rationale behind SSL/TLS session-aware user authentication as a lightweight an...
The Transport Layer Security (TLS) protocol aims to provide confidentiality and integrity of data in transit across untrusted networks. TLS has become the de facto protocol standard for secured Internet and mobile applications. TLS supports several symmetric encryption options, including a scheme based on the RC4 stream cipher. In this paper, we present ciphertext-only plaintext recovery attack...
Tumour lysis syndrome (TLS) is a constellation of meta- bolic complications due to the rapid destruction of malignant cells, causing renal, cardiac or cerebral dysfunction. Electrolyte abnormalities include hyperuricaemia, hyperphosphataemia, hyperkalaemia and hypocalcaemia. TLS-induced renal failure is mainly caused by uric acid and calcium phosphate crystal deposition and usually develops fol...
SSL/TLS has been designed to protect authenticity, integrity, and confidentiality. However, considering the possibility of TCP data injection, as described in [Wa04], it becomes obvious that this protocol is vulnerable to DoS attacks just because it is layered upon TCP. In this paper, we analyze DoS-attacks on SSL/TLS and describe a simple, yet effective way to provide protection for SSL/TLS by...
Man-in-the-middle (MITM) attacks pose a serious threat to SSL/TLS-based e-commerce applications, such as Internet banking. SSL/TLS session-aware user authentication can be used to mitigate the risks and to protect users against MITM attacks in an SSL/TLS setting. In this paper, we further delve into SSL/TLS session-aware user authentication and possibilities to implement it. More specifically, ...
This paper reports on the radiometric calibration and the use of calibrated intensity data in applications related to snow cover monitoring with a terrestrial laser scanner (TLS). An application of the calibration method to seasonal snow cover change detection is investigated. The snow intensity from TLS data was studied in Sodankylä, Finland during the years 2008-2009 and in Kirkkonummi, Finla...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید