نتایج جستجو برای: universal message
تعداد نتایج: 172516 فیلتر نتایج به سال:
We developed an architecture optimization technique called divide-and-concatenate and applied it to a cryptographic message authentication code (MAC). This is based on two key observations: (i) The area of a multiplier and associated data path decreases quadratically and their speeds increase gradually as their operand size is reduced. (ii) Two w-bit universal hash function data paths (each wit...
in the process of revelation, divine message is transmitted from the sublime lord and by the prophet to the people. this heavenly message can be considered from several aspects, including that of invitation as a separate category. the present article deals with the linguistic dimension of invitation in the qur’an, specifically in the context of meccan suras. hence, the structure of invitation l...
Background: Mobile phone is one of the most important necessary tools in today’s life which can threaten people’s health in some conditions. The present study was carried out to compare the effect of educational intervention by short message and pamphlet on the behavior of steel factory staff in Ardakan, Yazd province, Iran.Materials and Methods: The present study was experimentally carried out...
We investigate the performance of state of the art universal steganalyzers proposed in the literature. These universal steganalyzers are tested against a number of well-known steganographic embedding techniques that operate in both the spatial and transform domains. Our experiments are performed using a large data set of JPEG images obtained by randomly crawling a set of publicly available webs...
Multiparty cryptography is an important topic in contemporary cryptography. In this paper we examine the security of some multi-party signature schemes. In particular, we point out that a multisignature scheme is vulnerable to universal forgery by an insider attacker under reasonable assumptions. This attack can be applied to some generalizations as well. Then we present a universal forgery att...
We consider the compound memoryless quantummultiple-access channel (QMAC) with two sending terminals. In this model, the transmission is governed by the memoryless extensions of a completely positive and trace preserving map which can be any element of a prescribed set of possible maps. We study a communication scenario, where one of the senders shares classical message transmission goals with ...
The portability of new miniaturized devices, together with their ability to connect conveniently to networks in different places, makes mobile computing possible. Recent advances that have led to increasing bandwidths, for wireless communications, enable mobile users to utilize a vast range of sophisticated services such as real-time collaborative services. Garnet Collaborative system is a univ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید