نتایج جستجو برای: ident
تعداد نتایج: 404 فیلتر نتایج به سال:
An optimal probabilistic solution for information confinement, privacy, and security in RFID systems
In this paper, we provide the following contributions to enhance the security of RFID based systems. First, we assume that among multiple servers storing the information related to the tags some of them can be compromised. For this new threat scenario, we devise a technique to make RFID identification server dependent, providing a different unique secret key shared by a tag and a server. The so...
Owing to the dynamic development of the Internet and information technology, user can now access information and services provided by remote service provider through the Internet. The Internet is an open medium of communication; hence, in order to ensure private communication, this study designs an "anonymous user identification protocol" to determine user identities, as well as negotiating a p...
Computation RFID (CRFID) expands the limit of traditional RFID by granting computational capability to RFID tags. RFID tags are powered by Radio-Frequency (RF) energy harvesting. However, CRFID tags need extra energy and processing time than traditional RFID tags to sense the environment and generate sensing data. Therefore, Dynamic Framed Slotted ALOHA (DFSA) protocol for traditional RFID is n...
Zero-knowledge proxy re-identification (ZK-PRI) has been introduced by Blaze et al. in 1998 together with two other well known primitives of recryptography, namely proxy re-encryption (PRE) and proxy re-signature (PRS). A ZK-PRI allows a proxy to transform an identification protocol for Alice into an identification protocol for Bob using a re-proof key. PRE and PRS have been largely studied in ...
ii The members of the Committee appointed to examine the thesis of Robert M. McCall Jr. find it satisfactory and recommend that it be accepted. Acknowledgements I would like to take this time to thank a few people who were key players not only in the development of this thesis, but also helped me to grow on personal and professional levels. The first people I would like to thank are my parents ...
This paper compares the advantages and disadvantages o f the "pre-planned" and "postplanned" approaches to evaluating program effectiveness. These evaluative approaches are compared along a number o f dimensions which include: (a) Reliability o f data and the cost o f collecting it; (b) Internal validity; (c) External validity; (d) Evaluation obtrusiveness and threat; and (e) Program goal displ...
as a predict ive tool for the detect ion of periods of large declines in the nancial markets as rst suggested in [2]. The crit icism was based on a rather primit ive \ eye−balling analysis" lacking the consistent methodology used in the ident i cat ion of more than twenty crashes on the US, Ho ng−Kong and FX markets alone which all were preceded by a market bubble parameterised by eq. (1) [3]. ...
The process of finding the antecedent of zero pronoun, that is indispensable to Japanese language understanding, is the topic of this paper. Here we mainly concern with discourses comprising two sentences that are in a subordinate relation, especially one of them describes the agent's volitional action and the other describes the reason of the action. We propose basically two new principles: (1...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید