نتایج جستجو برای: nicolsons scheme

تعداد نتایج: 222639  

Ali Saeidi Rashkolia Masoud Hadian Dehkordi Mohammad Mahdi Zahedi,

In this paper,we introduce a new verifiable multi-use multi-secretsharing scheme based on automata and one-way hash function. The scheme has theadversary fuzzy structure and satisfy the following properties:1) The dealer can change the participants and the adversary fuzzy structure without refreshing any participants' real-shadow. 2) The scheme is based on the inversion of weakly invertible fin...

Journal: :iranian journal of applied animal science 2015
j.l. malole r.j.m. kadigi a.z. sangeda

this study highlights the costs and benefits of indigenous beef cattle fattening schemes in shinyanga urban and kishapu districts in tanzania. specifically, in this study the net profit (np) for fatteners between beef cattle fattening schemes has been determined. the schemes were divided into two main categories, scheme 1 in which the animals were fed on cottonseed hulls (cshl) based diets and ...

A non-interactive (t,n)-publicly veriable secret sharing scheme (non-interactive (t,n)-PVSS scheme) is a (t,n)-secret sharing scheme in which anyone, not only the participants of the scheme, can verify the correctness of the produced shares without interacting with the dealer and participants. The (t,n)-PVSS schemes have found a lot of applications in cryptography because they are suitable for<...

Journal: :asian journal of sports medicine 0
brad j. schoenfeld department of health sciences, cuny lehman college, bronx, usa; department of health sciences, cuny lehman college, bronx, usa. tel: +1-7189601999, fax: +1-7189601999 dan ogborn mcmaster university, ontario, canada bret contreras sport performance research institute, auckland university of technology, auckland, new zealand tom cappaert rocky mountain university of health professionals, provo, usa alex silva ribeiro group of study and research in metabolism, nutrition, and exercise, londrina state university, londrina, brazil brent a. alvar rocky mountain university of health professionals, provo, usa

conclusions this study indicates that low-load rt results in greater accumulations in vl compared to high-load rt over the course of 8 weeks of training. results after adjusting for the pre-test scores, there was a significant difference between the two intervention groups on post-intervention total vl with a very large effect size (f (1, 15) = 16.598, p = .001, ηp2 = .525). there was a signifi...

Journal: :international journal of health policy and management 0
kanchan mukherjee centre for health policy, planning and management, school of health systems studies, tata institute of social sciences (tiss), mumbai, india

medicines constitute a substantial proportion of out-of-pocket (oop) expenses in indian households. in order to address this issue, the government of india launched the jan aushadhi (medicine for the masses) scheme (jas) to provide cheap generic medicines to the patients (http://janaushadhi.gov.in/about_jan_aushadhi.html). these medicines are provided through the jan aushadhi stores established...

A. Cheraghi

In a multi-secret sharing scheme, several secret values are distributed among a set of n participants.In 2000 Chien et al.'s proposed a (t; n) multi-secret sharing scheme. Many storages and publicvalues required in Chien's scheme. Motivated by these concerns, some new (t; n) multi-secret sharingschemes are proposed in this paper based on the Lagrange interpolation formula for polynomials andcip...

Certificateless public key cryptography (CL-PKC) is a useful method in order to solve the problems of traditional public key infrastructure (i.e., large amount of computation, storage and communication costs for managing certificates) and ID-based public key cryptography (i.e., key escrow problem), simultaneously. A signcryption scheme is an important primitive in cryptographic protocols which ...

In this paper, we propose a new framework for joint encryption encoding scheme based on polar codes, namely efficient and secure joint secret key encryption channel coding scheme. The issue of using new coding structure, i.e. polar codes in Rao-Nam (RN) like schemes is addressed. Cryptanalysis methods show that the proposed scheme has an acceptable level of security with a relatively smaller ke...

شادپرور, عبدالاحد, عسکری همت, حشمت الله, میرایی آشتیانی, سید رضا, واعظ ترشیزی, رسول,

     The objectives of this research were to simulate and optimize three open nucleus breeding schemes for improvement of growth traits and carcass composition in Lori-Bakhtiari lambs with 500 ewes in nucleus using a deterministic approach. These schemes were: scheme 1 with natural mating and mating ratio (M) of 50 ewes per ram in nucleus and member flocks (base), scheme 2 with artificial insem...

Journal: :journal of communication engineering 0
parisa daneshjoo computer engineering department, science and research branch, islamic azad university, tehran, iran hamid haj seyed javadi department of mathematics and computer science, shahed university, tehran, iran hamid reza sharifi computer engineering department, science and research branch, islamic azad university, tehran, iran

sink location is considered as a basic service in geographic routing in wireless sensor networks. obtaining the location of sink node by source node using an efficient method with low complexity has always been a challenging issue in research. in this paper, a sink location algorithm based on fano plane is proposed. the research challenge is how to ensure the intersection of two slq and sla rou...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید