نتایج جستجو برای: scale liao and masters

تعداد نتایج: 16891336  

Journal: :Nature Reviews Microbiology 2016

Journal: :Geographical Review of Japan 1943

Journal: :IACR Cryptology ePrint Archive 2013
Roel Peeters Jens Hermans

We show that the Liao and Hsiao’s protocol achieves neither tag-authentication nor privacy.

Journal: :The Musical Times 1910

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده زبانهای خارجی 1392

the present study was an attempt to compare the effect of peer metalinguistic corrective feedback on elementary and intermediate efl learners speaking ability to see which level benefits more from this type of feedback. to this end, 117 female efl learners at grade 3, al-zahra high school in kermanshah, iran were non-randomly chosen. the homogeneity of the participants was attained through a pi...

Journal: :Renaissance and Reformation 2017

Journal: :I. J. Network Security 2008
Mohammed Misbahuddin C. Shoba Bindu

Recently, Das, Saxena and Gulati proposed a dynamic Id based remote user authentication scheme that allows the users to choose and change their passwords freely and does not maintain verifier table. But their scheme has few weaknesses and cannot achieve mutual authentication. In 2005, Liao, Lee and Hwang showed that Das et al. scheme is vulnerable to guessing attack and proposed an enhanced sch...

2012
Fei Xue Peiqin Zhou

To help understand how media in China and the United States respond to the growing environmental concern, the authors conducted a comparative content analysis to study environmental advertising claims in two weekly Chinese news magazines—Liao Wang and China News Weekly—and two weekly U.S. news magazines—Time and Newsweek. The use of environmental claims, advertising strategy, and advertiser cha...

Journal: :I. J. Network Security 2011
Manoj Kumar Mridul Kumar Gupta Saru Kumari

In 2006, Liao et al. proposed a scheme over insecure networks. In 2006, Yoon-Yoo, and in 2008, Xiang et al. analyzed Liao et al.’s scheme and both of them pointed out, more or less, same vulnerabilities: like offline password guessing attack, impersonating the server by replay attack, denial of service attack on password changing and insider attack on it. But none of them suggested any solution...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید