نتایج جستجو برای: 9 weaknesses
تعداد نتایج: 503181 فیلتر نتایج به سال:
This paper aims to explore the perceptions of examiners in examining bachelor's level answer sheets. study was carried out by adopting hermeneutic phenomenological method under a qualitative research design. The participant were five teachers from constituent campuses Tribhuvan University.This explored whether students mismatched numbers, such as writing incorrect or an irrelevant answer. Unpre...
E-learning is one of impact the development information and communication technology (ICT) applied in education using accessible website. The purpose this research to know implementation Institution’s E-Learning Platform strengths weaknesses ITB AAS Indonesia. This applies descriptive qualitative research. result study shows that Indonesia began implementing e-learning support face-to-face clas...
We discuss two intrinsic weaknesses of the spectral graph partitioning method, both of which have practical consequences. The first is that spectral embeddings tend to hide the best cuts from the commonly used hyperplane rounding method. Rather than cleaning up the resulting suboptimal cuts with local search, we recommend the adoption of flow-based rounding. The second weakness is that for many...
HAS-V is a cryptographic hash function which processes 1024-bit message blocks and produces a hash value of variable length. The design of the hash function is based on design principles of the MD4 family. Recently, weaknesses have been shown in members of this family. Therefore, the analysis of the HAS-V hash function is of great interest. To the best of our knowledge this is the first article...
TriStrata appears to have implemented a variation of Maurer’s randomised cipher. We define a variation of Maurer’s cipher that appears to be similar to the TriStrata version, and show several cryptanalytical attacks against our variant.
We show that for various choices of the parameters in the SL2(IF2n) hashing scheme, suggested by Tillich and Zémor, messages can be modified without changing the hash value. Moreover, examples of hash functions “with a trapdoor” within this family are given. Due to these weaknesses one should impose at least certain restrictions on the allowed parameter values when using the SL2(IF2n) hashing s...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید