نتایج جستجو برای: pong mechanism

تعداد نتایج: 565988  

Journal: :IACR Cryptology ePrint Archive 2001
Masao Mori

A sufficient condition for secure ping–pong protocols is repretsented. This condition, called name– suffixing, is essentially to insert identities of participants in messages. We prove its sufficiency and discuss the feature of security in terms of name–suffixing.

Journal: :Journal of Cardiovascular Diseases & Diagnosis 2017

Journal: :The Southeast Asian journal of tropical medicine and public health 1992
P Kamolratanakul B Dhanamun S Thaithong

People in rural areas usually help themselves when malaria attacks by using a drug preparation under the name of "ya-chud" bought from the grocery in the village. The objective of this study was to determine the behavior towards malarial treatment of local inhabitants in two malarious areas in eastern Thailand. Groups of 271 and 131 local inhabitants in villages in Pong Nam Ron and Bo Thong Dis...

Journal: :International Journal of Human-computer Interaction 2021

Cognitive inhibition, a key constituent of healthy cognition, has been shown to be susceptible age-related cognitive declines. Research that rehabilitation training can facilitate older adults maintain functions. Compared alone, the combination physical and exercises is more effective train adults’ Focusing on we design Ping Pong exergame in this work, which incorporates traditional task with g...

Journal: :Annales Mathematicae Silesianae 2018

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید