نتایج جستجو برای: verification is not verifiable

تعداد نتایج: 7944505  

2010
S. Sharmila Deva Selvi S. Sree Vivek C. Pandu Rangan

Signcryption as a single cryptographic primitive offers both confidentiality and authentication simultaneously. Generally in signcryption schemes, the message is hidden and thus the validity of the ciphertext can be verified only after unsigncrypting the ciphertext. Thus, a third party will not be able to verify whether the ciphertext is valid or not. Signcryption schemes that allow any user to...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی 1388

foreign policy takes root from complicated matters. however, this issue may be more truth about armenia. although the new government of armenia is less than 20 years, people of this territory are the first ones who officially accepted christianity. in very past times, these people were a part of great emperors like iran, rome, and byzantium.armenia is regarded as a nation with a privileged hist...

Journal: :IACR Cryptology ePrint Archive 2009
Jacob C. N. Schuldt Kanta Matsuura

Undeniable signatures, introduced by Chaum and van Antwerpen, require a verifier to interact with the signer to verify a signature, and hence allow the signer to control the verifiability of his signatures. Convertible undeniable signatures, introduced by Boyar, Chaum, Damg̊ard, and Pedersen, furthermore allow the signer to convert signatures to publicly verifiable ones by publicizing a verifica...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده ادبیات و علوم انسانی 1394

abstract there is not much sources about ancient carnival and ceremonies , but some information can be gain from documents . as a matter of fact the ceremonies were a part of zarartiyan principles which zartosht had taken them to his religion . it should be mentioned that the oldest ceremonies are about poster and agriculture principles this seasonal ceremonies were very important for agri...

2016
Nirvan Tyagi

Private communication over the Internet continues to be a difficult problem. Even if messages are encrypted, it is hard to deliver them without revealing metadata about which pairs of users are communicating. Scalable systems such as Tor are susceptible to traffic analysis. In contrast, the largest-scale systems with metadata privacy require passing all messages through a single server, which p...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان تهران - دانشکده زیست شناسی 1388

126 abstract: in this research we studied the effects of cyclic hydration and dehydration of cysts of artemia urmiana and artemia parthenogenetica on the hatching percentage, survival and growth. the experiment was carried out in 3 treatments (1-3 hydration/dehydration cycles) with 3 replicates for each treatment. later effects of cold preservation at -20°c during three time periods were ...

1992
Philipp Hanschke

The KL-ONE concept langu age provides role-value ma.ps (RVMs) as a concept forming operator that compares sets of role fillers. This is a useful means to specify structural properties of concepts. Recently, it has been shown that concept languages providing RVMs together with some other common concept-forming operators induce an undecidable subsumption problem. Thus, RVMs have been restricted t...

2012
Erwan Bousse David Mentré Benoît Combemale Benoît Baudry Takaya Katsuragi

Systems engineering, and especially the modeling of safety critical systems, needs proper means for early Validation and Verification (V&V) to detect critical issues as soon as possible. The objective of our work is to identify a verifiable subset of SysML that is usable by system engineers, while still amenable to automatic transformation towards formal verification tools. As we are interested...

2010
Zhong Shao

Certified software consists of a machine-executable program plus a formal machine-checkable proof that the software is free of bugs with respect to a claim of dependability. The conventional wisdom is that certified software will never be feasible because the dependability of any real software must also rely on that of its underlying operating system and execution environment which is too low-l...

Journal: :international journal of hematology-oncology and stem cell research 0
mohammadreza ostadali hematology- oncology and stem cell transplantation research center, shariati hospital, tehran univer andisheh ghashghaie hematology- oncology and stem cell transplantation research center, shariati hospital, tehran univer ardeshir ghavamzadeh hematology- oncology and stem cell transplantation research center, shariati hospital, tehran univer

the most important factor in donor-recipient matching for hematopoietic stem cell transplantation is their hla typing. for many patients, we can not find a full-matched donor. in high risk patients, one locus  mismatched related donors are suitable alternatives. (1, 2) since the matching of patients and their siblings usually is based on low resolution hla typing, the matching of one locus mism...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید