نتایج جستجو برای: 9 weaknesses

تعداد نتایج: 503181  

2014
Antoine Delignat-Lavaud Karthikeyan Bhargavan

Transport Layer Security (TLS) is commonly used to provide server-authenticated secure channels for HTTPS web applications. From the viewpoint of the client, however, the server authentication guarantees of HTTPS are frequently misconstrued to identify a single HTTPS endpoint or origin whereas, in practice, the HTTPS server may be serving any one of a large set of origins. This issue is even mo...

2012
Mike W. Peng Ronaldo C. Parente

Undertaking foreign direct investment (FDI) is the defining feature of multinational enterprises (MNEs). While emerging economies as recipients of FDI are familiar with MNEs, these MNEs tend to be firms from the developed world. A new breed of home-grown MNEs has now arisen from the emerging economies, in particular the group known as BRIC (Brazil, Russia, India, and China). In this article, th...

Journal: :Math. Log. Q. 2002
Chris Pollett Randall Pruim

In this paper we provide a new arithmetic characterization of the levels of the log-time hierarchy (LH). We define arithmetic classes Σ k and Π log k that correspond to Σk-LOGTIME and Πk-LOGTIME respectively. We break Σ k and Π log k into natural hierarchies of subclasses Σm·log k and Π m·log k . We then define bounded arithmetic deduction systems (TΣ k ) ′ whose U{|id|}B(Σ log k )-definable fu...

2016
Zippy Erlich

The philosophy underlying open source software (OSS) is enabling programmers to freely access the software source by distributing the software source code, thus allowing them to use the software for any purpose, to adapt and modify it, and redistribute the original or the modified source for further use, modification, and redistribution. The modifications, which include fixing bugs and improvin...

1993
Joan Daemen René Govaerts Joos Vandewalle

In some applications for synchronous stream ciphers, the risk of loss of synchroniration cannot be eliminated completely. In these cases frequent rcsynchroniration or resynduonisation upon request may be necessary. In the paper it is shown that this can lead to significant deterioration of the cryptographic security. A powerful general attack on nonlinearly filtered linear (over Z,) systems is ...

Journal: :SIAM J. Comput. 1997
Charles H. Bennett Ethan Bernstein Gilles Brassard Umesh V. Vazirani

Recently a great deal of attention has been focused on quantum computation following a sequence of results [Bernstein and Vazirani, in Proc. 25th Annual ACM Symposium Theory Comput., 1993, pp. 11–20, SIAM J. Comput., 26 (1997), pp. 1411–1473], [Simon, in Proc. 35th Annual IEEE Symposium Foundations Comput. Sci., 1994, pp. 116–123, SIAM J. Comput., 26 (1997), pp. 1474–1483], [Shor, in Proc. 35th...

Journal: :Physical review. E, Statistical, nonlinear, and soft matter physics 2009
J Machta

Parallel tempering, also known as replica exchange Monte Carlo, is studied in the context of two simple free-energy landscapes. The first is a double-well potential defined by two macrostates separated by a barrier. The second is a "golf course" potential defined by microstates having two possible energies with exponentially more high-energy states than low-energy states. The equilibration time...

2006
John H. Maindonald

Predictive accuracy claims should give explicit descriptions of the steps followed, with access to the code used. This allows referees and readers to check for common traps, and to repeat the same steps on other data. Feature selection and/or model selection and/or tuning must be independent of the test data. For use of cross-validation, such steps must be repeated at each fold. Even then, such...

2011
Juliane Krämer Dmitry Nedospasov Jean-Pierre Seifert

This work presents several classes of messages that lead to data leakage during modular exponentiation. Such messages allow for the recovery of the entire secret exponent with a single power measurement. We show that padding schemes as defined by industry standards such as PKCS#1 and ANSI x9.31 are vulnerable to side-channel attacks since they meet the characteristics defined by our classes. Th...

Journal: :Journal of Educational Study 2021

ABSTRACT
 This research aims at finding out 1) the challenges of teachers in teaching speaking during online learning SMAN 2 Abiansemal, 2) teachers’ ways to cope with Abiansemal and 3) strengths weaknesses strategy used by investigated speaking. The subjecs this were three English Abiansemal. To collect data, two instruments needed, observation sheet interview guide. obtained data analyze...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید