نتایج جستجو برای: authentication data structure

تعداد نتایج: 3694940  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور مرکز - دانشکده زبانهای خارجی 1391

the primary goal of the current project was to examine the effect of three different treatments, namely, models with explicit instruction, models with implicit instruction, and models alone on differences between the three groups of subjects in the use of the elements of argument structures in terms of toulmins (2003) model (i.e., claim, data, counterargument claim, counterargument data, rebutt...

2005
Andrea Oermann Jana Dittmann Claus Vielhauer

In this paper, a new concept for classifying handwriting data and its analysis for biometric user authentication is presented. The concept’s characteristic is the combination of syntax and semantics. It implies a determination of four distinct levels of syntax and semantics to lower complexity and structure information. We demonstrate the concept’s impacts on on-line handwritings and the user v...

Journal: :EURASIP Journal on Advances in Signal Processing 2003

2015
Babak Nouri-Moghaddam Hamid Reza Naji

Wireless Sensor Networking continues to evolve as one of the most challenging research areas. Considering the insecure nature of these networks and the fact that sensor nodes are distributed in a hostile environment, having a wellimplemented security scheme is absolutely essential. Bearing in mind the important security services like authentication and access control, we have proposed a novel s...

Journal: :CoRR 2009
Baolong Liu Joan Lu Yau Jim Yip

Data integrity is the fundamental for data authentication. A major problem for XML data authentication is that signed XML data can be copied to another document but still keep signature valid. This is caused by XML data integrity protecting. Through investigation, the paper discovered that besides data content integrity, XML data integrity should also protect element location information, and c...

Journal: :IEEE Trans. Consumer Electronics 2003
Yongdong Wu Robert H. Deng

—Stream authentication schemes (SAS) aim to achieve effective authentication of multicast streams over lossy networks. Almost all of the existing SASs are designed for stream data integrity protection only. In this paper, we argue that content integrity protection is more important than data integrity to human users. We present a content-aware SAS in Motion JPEG2000 streaming. In our scheme, a ...

2007
Charalampos Papamanthou Roberto Tamassia

Authentication is increasingly relevant to data management. Data is being outsourced to untrusted servers and clients want to securely update and query their data. For example, in database outsourcing, a client’s database is stored and maintained by an untrusted server. Also, in simple storage systems, clients can store very large amounts of data but at the same time, they want to assure their ...

2007
Stavros Papadopoulos Yin Yang Dimitris Papadias

We study processing and authentication of long-running queries on outsourced data streams. In this scenario, a data owner (DO) constantly transmits its data to a service provider (SP), together with additional authentication information. Clients register continuous range queries to the SP. Whenever the data change, the SP must update the results of all affected queries and inform the clients ac...

Journal: :international journal of electrical and electronics engineering 0
mohammad javad emadi amirkabir university of technology behzad abdolmaleki information systems and security laboratory (issl), sharif university of technology, tehran, iran karim baghery information systems and security laboratory (issl), sharif university of technology, tehran, iran

as a response to a growing interest in rfid systems such as internet of things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. hence, authentication protocols to increase security and privacy in rfid applications have gained much attention in the literature. in this study, security and privac...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید