نتایج جستجو برای: traditional four step model

تعداد نتایج: 3025064  

Journal: :IACR Cryptology ePrint Archive 2011
Mario Romsy

In [BKT11] Baba, Kotyada and Teja introduced the FACTOR problem over non-abelian groups as base of an ElGamal-like cryptosystem. They conjectured that there is no better method than the naive one to solve the FACTOR problem in a general group. Shortly afterwards Stanek published an extension of the baby-step giant-step algorithm disproving this conjecture [Sta11]. Since baby-step giant-step met...

2007
David Gurzick A. Ozok Barbara Morris

A survey was conducted on 210 Baby Boomers (Age mean = 51.4 Std. dev. 5.46) within the United States to determine their current use of online technology in social interactions, their preferences in these interactions, and the expectations they have of near-future online communication technologies. The findings highlight the importance of online communication in their lives and spotlight their w...

2017
Anneke Horstman Mengfan Li Iris Heidmann Mieke Weemen Baojian Chen Jose M. Muino Gerco C. Angenent Kim Boutilier

Anneke Horstman, Mengfan Li, Iris Heidmann, Mieke Weemen, Baojian Chen, Jose M. Muino, Gerco C. Angenent, and Kim Boutilier Wageningen University and Research, Bioscience, 6708 PB Wageningen, The Netherlands Wageningen University and Research, Laboratory of Molecular Biology, 6708 PB Wageningen, The Netherlands Enza Zaden Research and Development, 1602 DB Enkhuizen, The Netherlands Max Planck I...

2006
Nelia Mann Samuel E. Vázquez

We present a simple procedure to construct non-local conserved charges for classical open strings on coset spaces. This is done by including suitable reflection matrices on the classical transfer matrix. The reflection matrices must obey certain conditions for the charges to be conserved and in involution. We then study bosonic open strings on AdS5×S. We consider boundary conditions correspondi...

2010
Hassan Jameel Asghar Josef Pieprzyk Huaxiong Wang

We propose a new protocol providing cryptographically secure authentication to unaided humans against passive adversaries. We also propose a new generic passive attack on human identification protocols. The attack is an application of Coppersmith’s baby-step giantstep algorithm on human identification protcols. Under this attack, the achievable security of some of the best candidates for human ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه فردوسی مشهد 1372

کار تئوری و محاسباتی ارائه شده در اینجا در ارتباط با به کار گرفتن و بسط و توسعه یک مدل کامپیوتری جهت بررسی و مطالعه فرآیندهای ایرودینامیکی و احتراقی درون یک اتاق سیلکونی با سوخت گاز طبیعی می باشد. برای مطالعه فرآیندها از مدلهای توربولانس ، تشعشع و احتراق پیشرفته استفاده شده است . ابتدا ایرودینامیک داخل اتاق را در حالت ایزوترمال با استفاده از دو مدل توربولانس شبیه سازی شده و نتایج با اطلاعات تجر...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید