نتایج جستجو برای: ident
تعداد نتایج: 404 فیلتر نتایج به سال:
A problem of solving a system of multivariate quadratic polynomials over a finite field, which is called an MQ problem, is a promising problem in cryptography. A number of studies have been conducted on designing public-key schemes using the MQ problem, which are known as multivariate public-key cryptography (MPKC). However, the security of the existing schemes in MPKC relies not only on the MQ...
Human identification protocols are challenge-response protocols that rely on human computational ability to reply to random challenges from the server based on a public function of a shared secret and the challenge to authenticate the human user. One security criterion for a human identification protocol is the number of challenge-response pairs the adversary needs to observe before it can dedu...
Fifty-five isolates of coagulase-negative staphylococci from blood were identified four times each by using the API Staph-Ident (API-SI) system to determine the identification reproducibility of the system. Identifications were determined by using both Version 1 and Version 2 of the API-SI Profile Index. The 75 to 100% reproducibility levels, including reproducible nonidentifications, were 98.2...
Radio Frequency Identification (RFID) is a technology aimed at efficiently identifying and tracking goods and assets. Such identification may be performed without requiring line-of-sight alignment or physical contact between the RFID tag and the RFID reader, whilst tracking is naturally achieved due to the short interrogation field of RFID readers. That is why the reduction in price of the RFID...
Radio frequency identification (RFID) tag privacy is an important issue to RFID security. To date, there have been several attempts to achieve the wide-strong privacy by using zero-knowledge protocols. In this paper, we launch an attack on the recent zero-knowledge based identification protocol for RFID, which was claimed to capture wide-strong privacy, and show that this protocol is flawed. Su...
The Agreement-By-Correspondence framework (=‘ABC’) is a theory of agreement developed (by Walker 2000a,b, Hansson 2001, and especially Rose & Walker 2004) to explain long-distance consonant harmony: patterns where non-adjacent consonants agree with each other, but do not interact with the other material that intervenes between them. In ABC, the basis for this agreement is Surface Correspondence...
This study explores metathesis in Syrian Arabic (SyA). The data reveal two types of metatheses. Type-I is phonologically conditioned, involving at least one the four root consonants, ʒ, f, ʕ and ћ with fricatives (z, s), liquids (l, r) or gutturals (q/ʔ) specific positions within regardless word derivation. Type-II morpho-phonologically Standard reflexive Pattern VIII, (ʔi)ftaʕal, that resulted...
We present the first signature schemes whose security relies on computational assumptions relating to isogeny graphs of supersingular elliptic curves. We give two schemes, both of them based on interactive identification protocols. The first identification protocol is due to De Feo, Jao and Plût. The second one, and the main contribution of the paper, uses novel ideas that have not been used in...
Understanding how functional traits and diversity modulate plant interactions within forests is becoming a widespread research goal in ecology. We applied neighbourhood analysis to Mediterranean biodiversity manipulation experiment (IDENT-Macomer) assess the importance of predicting tree diameter increments (DI) mixed forest. used weigh competition index (NCI) dispersion (FDis), which metric. f...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید