نتایج جستجو برای: identification key

تعداد نتایج: 936593  

2011
Javier Lopez Antonio Maña Juan J. Ortega

While there is wide agreement on the immense potential of Internet, its growth and performance are adversely affected by security issues. Despite its impressive size, scope and reach, the Internet has not yet become a common vehicle for many of these new possibilities. Progress in fields as electronic commerce and government-citizen relationships have been limited by the open design of the netw...

2014
Eunok LEE Tae-Young CHOI Donggul WOO Mi-Sook MIN Shoei SUGITA Hang LEE

The hair microstructures of Korean terrestrial mammals from 23 species (22 wild and one domestic) were analyzed using light and scanning electron microscopy (SEM) to construct a hair identification key. The hairs were examined using the medulla structures and cuticular scales of guard hairs from the dorsal regions of mature adult animals. All cuticular scale structures in the hair of Rodentia, ...

2017
Jan Motl Pavel Kordík

For relational learning, it is important to know the relationships between the tables. In relational databases, the relationships can be described with foreign key constraints. However, the foreign keys may not be explicitly specified. In this article, we present how to automatically and quickly identify primary & foreign key constraints from metadata about the data. Our method was evaluated on...

2010
Jan Camenisch Nathalie Casati Thomas Groß Victor Shoup

Secure two-party authentication and key exchange are fundamental problems. Traditionally, the parties authenticate each other by means of their identities, using a public-key infrastucture (PKI). However, this is not always feasible or desirable: an appropriate PKI may not be available, or the parties may want to remain anonymous, and not reveal their identities. To address these needs, we intr...

2018

A new approach for identifying a friend aircrafts from foe (IFF) using public-key cryptosystem is introduced. Two schemes of public-key cryptosystem namely: RSA and knapsack public-keys are considered, which provide higher security than conventional identification methods. The practical aspects of using such systems for aircraft identification purposes are discussed. Computer simulation example...

Journal: :IEICE Transactions 2011
Hiroaki Anada Seiko Arita

We propose a generic way for deriving an identification (ID) scheme secure against concurrent man-in-the-middle attacks from a key encapsulation mechanism (KEM) secure against chosen ciphertext attacks on one-wayness (one-way-CCA). Then we give a concrete one-way-CCA secure KEM based on the Computational Diffie-Hellman (CDH) assumption. In that construction, the Twin Diffie-Hellman technique of...

Journal: :IEEE Trans. Information Theory 1996
Jacques Stern

The present article investigates the possibility of designing zero-knowledge identi-cation schemes based on hard problems from coding theory. Zero-knowledge proofs were introduced in 1985, in a paper by Goldwasser, Micali and Rackoo ((16]). Their practical signiicance was soon demonstrated in the work of Fiat and Shamir ((11]), who turned zero-knowledge proofs of quadratic residuosity into eeci...

2018

A new approach for identifying a friend aircrafts from foe (IFF) using public-key cryptosystem is introduced. Two schemes of public-key cryptosystem namely: RSA and knapsack public-keys are considered, which provide higher security than conventional identification methods. The practical aspects of using such systems for aircraft identification purposes are discussed. Computer simulation example...

2018

A new approach for identifying a friend aircrafts from foe (IFF) using public-key cryptosystem is introduced. Two schemes of public-key cryptosystem namely: RSA and knapsack public-keys are considered, which provide higher security than conventional identification methods. The practical aspects of using such systems for aircraft identification purposes are discussed. Computer simulation example...

Journal: :European Journal of Operational Research 2004
W. Michael Conklin Ken Powaga Stan Lipovetsky

A problem of identifying key drivers in customer satisfaction analysis is considered in relation to Kano theory on the relationship between product quality and customer satisfaction using tools from Cooperative Game Theory and Risk Analysis. We use Shapley Value and Attributable Risk techniques to identify priorities of key drivers of customer satisfaction, or key dissatisfiers and key enhancer...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید