نتایج جستجو برای: the man
تعداد نتایج: 16069788 فیلتر نتایج به سال:
In distance-bounding protocols, verifiers use a clock to measure the time elapsed in challenge-response rounds, thus upper-bounding their distance to the prover. This should prevent man-in-the-middle (MITM) relay attacks. Distance-bounding protocols may aim to prevent several attacks, amongst which terrorist fraud, where a dishonest prover helps the adversary to authenticate, but without passin...
This paper presents the first wireless pairing protocol that works in-band, with no pre-shared keys, and protects against MITM attacks. The main innovation is a new key exchange message constructed in a manner that ensures an adversary can neither hide the fact that a message was transmitted, nor alter its payload without being detected. Thus, any attempt by an adversary to interfere with the k...
the research questions were as follows: 1. is there any relationship between the students concious awareness of the form and implications of the conjuncations and their improvement in using appropriate conjunctions? 2. does students knowledge of the from and the implications of the conjunctions help them to produce more coherent writings. 3. does a comparison between english conjunctions and th...
the purpose of this study was to investigate how english language teachers in mashhad who teach students in the pre-university cycle perceived the impact of the efltee on their teaching. the target population was nearly all pre-university english language teachers in seven districts of mashhad in the scholastic year 2008/2009. a survey questionnaire which consisted of (36) likert type items, wa...
abstract this study evaluates the iranian pre-university english textbook in terms of needs, objectives, content, and methodology. the study was designed on the qualitative- quantitative survey basis using interviews and questionnaires, a researcher-made textbook evaluation checklist and a needs analysis questionnaire. the textbook evaluation questionnaire was used in this study to elicit the ...
abstract this quasi-experimental study was aimed at examining the impact of storyline complexity on the grammatical accuracy and complexity of advanced and intermediate efl learners. a total of 65 advanced and intermediate efl learners were selected from iran language institute (ili). an intact group including 35 intermediate participants and another intact group with 30 advanced participants ...
Trends in the diurnal temperature range (DTR) are examined in the late twentieth and the twenty-first centuries in a coupled climate model representing the atmosphere, ocean, sea ice, and land surface systems. Consistent with past studies, the DTR decreases during this time. These decreases are concentrated in middle latitudes, with much smaller changes occurring in the low latitudes. Strong se...
We present a security analysis of an internet banking system used by one of the bigger banks in the Netherlands, in which customers use a USB-connected device – a smartcard reader with a display and numeric keyboard – to authorise transactions with their bank card and PIN code. Such a set-up could provide a very strong defence against online attackers, notably Man-in-the-Browser attacks, where ...
Different security notions and settings for identification protocols have been proposed so far, considering different powerful adversaries that can play “man-in-the-middle” attacks. In this paper we consider one of the strongest forms of these attacks, namely resettably non-transferable identification introduced in [Bellare et al., Eurocrypt 2001]. This notion immunizes a scheme from powerful a...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید