نتایج جستجو برای: mousa abadi

تعداد نتایج: 966  

Journal: :Electr. Notes Theor. Comput. Sci. 2007
Juan Carlos López Pimentel Raúl Monroy Dieter Hutter

The verification of security protocols has attracted a lot of interest in the formal methods community, yielding two main verification approaches: i) state exploration, e.g. FDR [8] and OFMC [2]; and ii) theorem proving, e.g. the Isabelle inductive method [12] and Coral [13]. Complementing formal methods, Abadi and Needham’s principles aim to guide the design of security protocols in order to m...

Journal: :عرفان معاصر 0
السید علاءالدین شاهرخی استاذ مساعد بجامعةِ لُرِستان

meaning of islamic unity in two internal & external levels of diplomatic idea of islam has superior place. present situation of world of islam and various devilish plots for provoking disputes and enmity among the muslims shows well the necessity of this issue. undoubtedly, the survey of valuable experience of leaders of islamic world unity at present age, especially survey of seyed jamal al-di...

Journal: :Arthritis + Rheuma 2023

Smith EMD, Tharmaratnam K, Al-Abadi E et al. Attainment of low disease activity and remission targets reduces the risk severe flare new damage in childhood lupus. Rheumatology (Oxford) 2022; 61(8): 3378–3389. doi: 10.1093/rheumatology/keab915. PMID: 34894234; PMCID: PMC9348762.

Journal: :Pakistan languages and humanities review 2023

This study interprets Sufi narratives and perceptions of the participants to evaluate how metaphors personifications are applied add meaning text. The ghazals by Shad Azeem Abadi (Trans. Abadi, 2008) Hazrat Shah Niaz Sag-e-dar-Niaz, 2009), were selected hold a dialogue between what was said understood. For this purpose, three tenets Hermeneutic approach i.e. hermeneutic situation, circle, fusio...

Journal: :I. J. Network Security 2016
Prasanth Kumar Thandra J. Rajan S. A. V. Satya Murty

Password authentication schemes are one of the most commonly used solution to protect resources in network environment from unauthorized access. Since, their first introduction in [9], many password authentications schemes have been proposed and analysed by crypto community. Contribution of the present paper is two-folded. At first it presents the cryptanalysis results of Ramasamy et al.’s RSA ...

Journal: :JENIUS (Jurnal Ilmiah Manajemen Sumber Daya Manusia) 2020

Journal: :Journal of the Japanese Association for Petroleum Technology 2010

Journal: :Jurnal REKSA: Rekayasa Keuangan, Syariah dan Audit 2020

1998
P. Maneggia

The idea of parametric polymorphism is that of a single operator that can be used for di erent data types and whose behaviour is somehow uniform for each type. Reynolds [Reynolds, 1983] uses binary relations to de ne a uniformity condition for parametric polymorphism. In [Plotkin & Abadi, 1993] the authors proposed a second order logic for second order lambda-calculus; this logic is able to han...

Journal: :Inf. Comput. 2008
Wim H. Hesselink

A previous paper introduced eternity variables as an alternative to the prophecy variables of Abadi and Lamport and proved the formalism to be semantically complete: every simulation F : K −. L that preserves quiescence contains a composition of a history extension, an extension with eternity variables, and a refinement mapping. This result is strengthened here in three ways. Firstly, the assum...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید