نتایج جستجو برای: identification key
تعداد نتایج: 936593 فیلتر نتایج به سال:
در راستای بازنگری نمونه های هرباریومی متعلق به جنس delphinium، گونه d. kurdicum boiss. & hohen. برای اولین بار از غرب ایران گزارش می گردد. همچنین، گونه d. zalil aitch & hemsl. به عنوان یک گونه مستقل از d. semibarbatum bienert ex boiss. معرفی شده است. این گونه با گونه مجاور خود d. ochrolecum stev. ex dc. مقایسه شده است. این گونه ها براساس ویژگی های مورفولوژیکی، گرده شناسی و الگوی اپیدرم...
هدف از این تحقیق، مطالعه صفات تشریحی و استفاده از آنها به منظور دستیابی به صفات تشریحی افتراقی برگ جهت تفکیک بهتر گونه های جنس oryzopsis s. l. می باشد. بدین منظور، ساختار تشریحی برگ (بشره پشتی و برش عرضی) در 10 گونه از جنس oryzopsis s. l. در ایران برای اولین بار مورد بررسی قرار گرفت. در این تحقیق 43 صفت کمی و کیفی در 23 جمعیت کدگذاری و ارزیابی شدند. این صفات در میان گونه ها متغیر، اما در بین نم...
This paper offers a new version of the hHB protocol denoted Light-hHB. This proposal uses the same framework as hHB, that is a two stages protocol: the first one for the establishment of a session key between the reader and the tag and the second one similar to HB+. We also introduce in this paper a novel and lightweight key exchange protocol inspired by the BB84 protocol named the non-quantum ...
the changes in todays world organization, to the extent that instability can be characterized with the most stable organizations called this afternoon. if you ever change management component, an additional value to the organization was considered, today, these elements become the foundation the organization is survival. the definition of the entrepreneur to identify opportunities to exploit a...
We explore the problem of secret-key distribution in unidirectional channels, those in which a sender transmits information blindly to a receiver. We consider two approaches: (1) Key sharing across space, i.e., across simultaneously emitted values that may follow different data paths and (2) Key sharing across time, i.e., in temporally staggered emissions. Our constructions are of general inter...
Nowadays, using cryptographic systems play an effective role in security and safety technologies. One of the most applied kind of cryptography is Symmetric Cryptography and its applications. New aspects of symmetric Cryptography methodologies and applications has been presented by this paper. Security-based networks and some complex technologies such as RFID and parallel security settings has b...
In this article, we propose an identification scheme which is based on the two combinatorial problems Multivariate Quadratic equations (MQ) and Isomorphism of Polynomials (IP). We show that this scheme is statistical zero-knowledge. Using a trapdoor for the MQ-problem, it is possible to make it also identity-based, i.e., there is no need for distributing public keys or for certificates within t...
Currently, Belgium is introducing an electronic version of its identity card. In this article, we shortly describe the card, and give a brief introduction to its cryptographic features. In particular, we focus on the Public-Key Infrastructure (PKI) associated with the card.
This research study and analyse the various attacks RFID card on Mifare's disadvantage and safety concerns crux of the problem. The key recovery attack method depends on a plaintext-ciphertext pair on the existing relationship, as well as the secret parameters of the pseudo random number for use of the timing inappropriate. We proposed a scheme to improve the mechanisms for authentication, no a...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید