نتایج جستجو برای: identification key

تعداد نتایج: 936593  

Journal: :Applied Ecology and Environmental Research 2018

Journal: :Frontiers in Physics 2022

As important infrastructure, logistic networks need to be designed not only for robustness but also transportation efficiency. In order improve efficiency, different types of integrate form a double-layer coupled network. When some nodes fail in this network, especially the case limited repair resources, how evaluate node that needs give priority is great significance. study, an evaluation meth...

Journal: :Journal of nematology 2002
Zafar A Handoo

A key based on cyst and juvenile characters is given for identification of 12 valid Heterodera species in the H. avenae group. A compendium providing the most important diagnostic characters for use in identification of species is included as a supplement to the key. Cyst characters are most useful for separating species; these include shape, color, cyst wall pattern, fenestration, vulval slit ...

2013
QIAOLIAN SHI LIQING CHENG TAIBIN SHI

Fingerprint identification is divided into fingerprint pretreatment, fingerprint feature extract ion and a fingerprint match. Based on embedded technology and fingerprints processing algorithms, embedded automatic fingerprint identification system fingerprint identification of various processes study the algorithm, this paper expounds the characteristics of various algorithm with using details.

Journal: :RFC 2008
Pekka Nikander Julien Laganier

Status of This Memo This memo defines an Experimental Protocol for the Internet community. It does not specify an Internet standard of any kind. Discussion and suggestions for improvement are requested. Distribution of this memo is unlimited. Abstract This document specifies a new resource record (RR) for the Domain Name System (DNS), and how to use it with the Host Identity Protocol (HIP). Thi...

2005
Yunlei Zhao Shirley H. C. Cheung Binyu Zang Bin B. Zhu

In light of the recent work of Micali and Reyzin on showing the subtleties and complexities of the soundness notions of zeroknowledge (ZK) protocols when the verifier has his public-key, we reinvestigate the Cramer-Damg̊ard intended-verifier identification scheme and show two man-in-the-middle attacks in some reasonable settings: one simple replaying attack and one ingenious interleaving attack....

Journal: :IET Information Security 2014
Yi Jiang Wei Cheng Xiaojiang Du

For the purposes of information security and privacy between readers and tags, identity authentication is a significant issue for radio frequency identification (RFID) systems. In this study, the authors propose a novel security group-based key array authentication protocol, which is suitable for a large scale RFID environment. Based on a key array, this protocol can generate an authentication ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید