نتایج جستجو برای: scale liao and masters
تعداد نتایج: 16891336 فیلتر نتایج به سال:
We show that the Liao and Hsiao’s protocol achieves neither tag-authentication nor privacy.
the present study was an attempt to compare the effect of peer metalinguistic corrective feedback on elementary and intermediate efl learners speaking ability to see which level benefits more from this type of feedback. to this end, 117 female efl learners at grade 3, al-zahra high school in kermanshah, iran were non-randomly chosen. the homogeneity of the participants was attained through a pi...
Recently, Das, Saxena and Gulati proposed a dynamic Id based remote user authentication scheme that allows the users to choose and change their passwords freely and does not maintain verifier table. But their scheme has few weaknesses and cannot achieve mutual authentication. In 2005, Liao, Lee and Hwang showed that Das et al. scheme is vulnerable to guessing attack and proposed an enhanced sch...
To help understand how media in China and the United States respond to the growing environmental concern, the authors conducted a comparative content analysis to study environmental advertising claims in two weekly Chinese news magazines—Liao Wang and China News Weekly—and two weekly U.S. news magazines—Time and Newsweek. The use of environmental claims, advertising strategy, and advertiser cha...
In 2006, Liao et al. proposed a scheme over insecure networks. In 2006, Yoon-Yoo, and in 2008, Xiang et al. analyzed Liao et al.’s scheme and both of them pointed out, more or less, same vulnerabilities: like offline password guessing attack, impersonating the server by replay attack, denial of service attack on password changing and insider attack on it. But none of them suggested any solution...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید