نتایج جستجو برای: ban logic
تعداد نتایج: 157888 فیلتر نتایج به سال:
Developers of the UF Distributed Conferencing System, version 2 (DCS.v2) have proposed a protocol that involves the distribution of a session key by a trusted server to a principal with whom it will communicate. The protocol differs from standard key exchange protocols in that it attempts to address the issue of the delivery of a private key as well as the desired session key in a secure fashio...
With the rapid development of WLAN, more and more schools and businesses have begun to provide the WLAN for users. However, WLAN is considerably more susceptible to MitM (man-in-the-middle) attack. To overcome it, we propose a dynamic password technology named Two-way Dynamic Authentication Technology (TDAT). It uses two-factor during the initial authentication, and uses a two-way hash chain du...
We introduce a calculus with mobile names, distributed principals and primitives for secure remote communication, without any reference to explicit cryptography. The calculus is equipped with a system of types and effects providing static guarantees of secrecy and authenticity in the presence of a Dolev-Yao intruder. The novelty with respect to existing type systems for security is in the struc...
Radio Frequency Identification (RFID) is a promising new technology that is widely deployed for object tracking and monitoring, ticketing, supply-chain management, contactless payment, etc. However, RFID related security problems attract more and more attentions. This paper has studied a novel elliptic curve cryptography (ECC) based RFID security protocol and it shows some great features. First...
Mobile WiMAX (Worldwide Interoperability Microwave Access) requires the re-authentication of mobile stations as they change from one base station to another. IEEE 802.16e uses the Extensible Authentication Protocol (EAP) for authentication and key management. This requires about 1000 ms, therefore, it could not support mobile WiMAX applications such as video conference. In the present paper, we...
The recent research in Body Area Networks (BAN) is focused on making its communication more reliable, energy efficient, secure, and to better utilize system resources. In this paper we propose a novel BAN network architecture for indoor hospital environments, and a new mechanism of peer discovery with routing table construction that helps to reduce network traffic load, energy consumption, and ...
Applications of wearable and implanted wireless sensor devices are hot research area. A specialized field called the body area networks (BAN) has emerged to support this area. Managing and controlling such a network is a challenging task. An efficient media access control (MAC) protocol to handle proper management of media access can considerably improve the performance of such a network. Power...
In this article we study the minimum number κ of additional automata that a Boolean automata network (BAN) associated with a given blocksequential update schedule needs in order to simulate a given BAN with a parallel update schedule. We introduce a graph that we call NECC graph built from the BAN and the update schedule. We show the relation between κ and the chromatic number of the NECC graph...
This exploratory, qualitative study examined the perspectives of 22 lesbian and gay parents (15 female and seven male) who were residents of Florida while the state’s gay adoption ban was in effect and who had adopted or were in the process of adopting a child. Participants were interviewed about their experiences before and after the lifting of the gay adoption ban, which occurred in 2010. Par...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید