نتایج جستجو برای: toppling free fall shearing key group method

تعداد نتایج: 3355041  

Ali Davati Fatemeh Ghafarirad Hossin Ayatollahi Maryam Maleki Mohammad Hassan Ghosian Moghaddam,

Background and Objective: Prostate cancer is a prevalent disease around the world. The prostatic specific Antigen (PSA) test has recently proved itself as a useful method for the diagnosis and examination of patients with prostatic cancer. The objective of this study was to compare the stability of free PSA and total PSA in different storage settings. Materials and Method...

Journal: :Optics letters 2006
Jonathan R Birge Richard Ell Franz X Kärtner

We present a new method for measuring the spectral phase of ultrashort pulses that utilizes spectral shearing interferometry with zero delay. Unlike conventional spectral phase interferometry for direct electric-field reconstruction, which encodes phase as a sensitively calibrated fringe in the spectral domain, two-dimensional spectral shearing interferometry robustly encodes phase along a seco...

Journal: :International Journal of Surgery 2014

Journal: :Paediatrics & Child Health 2007

2005
Shanyu Zheng Stephen S. Lee

Traditional analysis of group key protocol performance is based on the cost of performing a single operation. We extend this analysis to examine the performance behavior of five group key protocols after execution of multiple operation. This paper reports the results of our experiments for 100 operations consist of combinations of join, leave, mass add and mass leave operations. The results of ...

Journal: :CoRR 2010
Qingfeng Cheng Chuangui Ma

In AFRICACRYPT 2010, Abdalla et al. first proposed a slight modification to the computations steps of the BD protocol, called mBD+P. Then they extended mBD+P protocol into mBD+S protocol. In this paper, we show that both of mBD+P and mBD+S protocols are vulnerable to malicious insiders attack. Further, we propose a simple countermeasure against this attack.

Journal: :J. Inform. and Commun. Convergence Engineering 2010
Jiun-Hau Liew Ivy Ong Sanggon Lee Hyotaek Lim Hoon-Jae Lee

549 Abstract— Lim et al. proposed a Hybrid Group Key Management scheme for Hierarchical Self-Organizing Sensor Network in 2008 to provide a secure way to pass down the group key for cluster-based communication. This paper presents two practical attacks on the scheme proposed by Lim et al. by tampering sensor nodes of a cluster to recover necessary secret keys and by exploiting the IDS employed ...

Journal: :IEICE Transactions 2009
Mark Manulis Koutarou Suzuki Berkant Ustaoglu

Recent advances in the design and analysis of secure two-party key exchange (2KE) such as the leakage of ephemeral secrets used during the attacked sessions remained unnoticed by the current models for group key exchange (GKE). Focusing on a special case of GKE — the tripartite key exchange (3KE) — that allows for efficient one-round protocols, we demonstrate how to incorporate these advances t...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید