نتایج جستجو برای: short message
تعداد نتایج: 500493 فیلتر نتایج به سال:
There are several different types of communication traffic with realtime demands apparent in distributed industrial and embedded systems, for example, group communication and process synchronization. The length of these messages is often very short but the traffic volume might be really high. Standard network protocols do not normally reach very high utilization for such small messages. This pa...
We present a new notion of short identity-based multisignature scheme with message recovery. We propose a concrete identity-based multisignature with message recovery scheme based on bilinear pairing in which multiple signers can generate a constant size multisignature on same message regardless of the number of signers. There is no requirement to transmit the original message to the verifier, ...
Objectives: Since forgetfulness is the major cause of missed appointments, reminder systems can be used prior to appointments. The present study aimed to evaluate the efficacy of different reminders [e-mails, social networks, telephone, and short message service (SMS)] in order to reduce missed appointments by orthodontic patients. Methods: Of a total of 751 active orthodontic patients, 379 we...
Some Embedded systems involve multiple processors connected by a communication medium. These processors communicate with each other exchanging short messages using some message based communication protocols such as Controller Area Network (CAN), SAE J1939 etc. With the induction of new features inside such networks, the number of messages will increase. The increase of messages may affect the n...
Background & Aims of the Study: Formative assessment of a student’s academic achievements is the basic step in any educational project. The aims of this research were: 1) To determine the feasibility of conducting a formative assessment for medical students with their participation and 2) To determine which methods are applicable for students' self-assessment. Materials and Methods: Sixteen...
Byzantine Agreement (BA) and Broadcast (BC) are considered to be the most fundamental primitives for fault-tolerant distributed computing and cryptographic protocols. An important variant of BA and BC is Asynchronous Byzantine Agreement (ABA) and Asynchronous Broadcast (called as A-cast) respectively. Most often in the literature, protocols for ABA and A-cast were designed for a single bit mess...
Signature schemes with message recovery have been wildly investigated a decade ago in the literature, but the first ID-based signature with message recovery goes out into the world until 2005. In this paper, we first point out and revise one little but important problem which occurs in the previous ID-based signature with message recovery scheme. Then, by completely different setting, we propos...
Tag-based message authentication is a popular cryptographic technique to digitally sign messages. However, for short messages, it often incurs additional costs due to large tags. In this paper, we propose a new scheme that achieves tagless message authentication. The scheme leverages a trade-off between character support and complexity of forgery to provide information security and authenticity.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید