نتایج جستجو برای: family security

تعداد نتایج: 593459  

2007
Reza Reyhanitabar Shuhong Wang Reihaneh Safavi-Naini

We present a new non-interactive message authentication protocol in manual channel model (NIMAP, for short) using the weakest assumption on the manual channel (i.e. assuming the strongest adversary). Our protocol uses enhanced target collision resistant (eTCR) hash family and is provably secure in the standard model. We compare our protocol with protocols with similar properties and show that t...

Journal: :Annales UMCS, Informatica 2011
Jakub Derbisz

We will present some ideas about sharing a secret in a monotonic access structure. We show the relations which occur between the method of encrypting a monotonic access structure with the use of basis sets or maximal unprivileged sets, and that based on a logical formula (used by Benaloh and Leichter in [1]). We will also give some facts connected with the problem of security, including the asp...

2010
Gilles Barthe Benjamin Grégoire Santiago Zanella Béguelin

CertiCrypt is a general framework to certify the security of cryptographic primitives in the Coq proof assistant. CertiCrypt adopts the code-based paradigm, in which the statement of security, and the hypotheses under which it is proved, are expressed using probabilistic programs. It provides a set of programming language tools (observational equivalence, relational Hoare logic, semantics-prese...

eHealth is the concept of using the stored digital data to achieve clinical, educational, and administrative goals and meet the needs of patients, experts, and medical care providers. Expansion of the utilization of information technology and in particular, the Internet of Things (IoT) in eHealth, raises various challenges, where the most important one is security and access control. In this re...

2003
Anupam Datta Ante Derek John C. Mitchell Dusko Pavlovic

Many authentication and key exchange protocols are built using an accepted set of standard concepts such as Diffie-Hellman key exchange, nonces to avoid replay, certificates from an accepted authority, and encrypted or signed messages. We introduce a basic framework for deriving security protocols from such simple components. As a case study, we examine the structure of a family of key exchange...

Background: One of the challenges of implementing the family physician program is the decrease in the number of doctors, especially in rural and deprived areas, the present study aimed to determine the intentions of family physicians to persist in the health centers affiliated in Hormozgan city. Methods: This cross-sectional study was conducted on 195 physicians in the health centers implement...

2008
Randall Frederick Young John C. Windsor Stephen R. Tate Steve Guynes Robert J. Pavur Mary C. Jones Sandra L. Terrell

The discipline of information security management is still in its infancy as evidenced by the lack of empirical scholarly work in this area. Most research within the information security domain focuses on specific technologies and algorithms and how it impacts the principles of confidentiality, integrity, and availability. But, an important area receiving little attention is the antecedents of ...

2007
Ulrike Meyer Hannes Tschofenig Georgios Karagiannis

The Internet Engineering Task Force (IETF) has worked on network layer mobility for more than 10 years and a number of RFCs are available by now. Although the IETF mobility protocols are not present in the Internet infrastructure as of today, deployment seems to be imminent since a number of organizations, including 3GPP, 3GPP2 and Wimax, have realized the need to incorporate these protocols in...

Journal: :IACR Cryptology ePrint Archive 2011
Shay Gueron Michael E. Kounavis

Vortex is a new family of one-way hash functions which has been submitted to the NIST SHA-3 competition. Its design is based on using the Rijndael block cipher round as a building block, and using a multiplication-based merging function to support fast mixing in a small number of steps. Vortex is designed to be a fast hash function, when running on a processor that has AES acceleration and has ...

2011
Pierre PESTIEAU Grégory PONTHIERE

Although the optimal policy under endogenous fertility has been widely studied, the optimal public intervention under endogenous childbearing age has remained largely unexplored. This paper examines the optimal family policy in a context where the number and the timing of births are chosen by individuals who differ as to how early fertility can weaken future earnings growth. We analyze the desi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید