نتایج جستجو برای: ban logic

تعداد نتایج: 157888  

2009
Jérôme Adda Samuel Berlinski Audrey Stern Michele Savini

This paper analyzes the effects of a ban on smoking in public places upon firms and consumers. Analysis of survey data from public houses finds that the Scottish smoking ban (introduced in March 2006) reduced pub sales and harmed medium run profitability. An event study analysis of the stock market performance of pub-holding companies corroborates the negative effects of the smoking ban on firm...

2017
Dongwoo Kang Jaewook Jung Donghoon Lee Hyoungshick Kim Dongho Won

The Proxy Mobile IPv6 (PMIPv6) is a network-based mobility management protocol that allows a Mobile Node(MN) connected to the PMIPv6 domain to move from one network to another without changing the assigned IPv6 address. The user authentication procedure in this protocol is not standardized, but many smartcard based authentication schemes have been proposed. Recently, Alizadeh et al. proposed an...

Journal: :I. J. Network Security 2016
Prasanth Kumar Thandra J. Rajan S. A. V. Satya Murty

Password authentication schemes are one of the most commonly used solution to protect resources in network environment from unauthorized access. Since, their first introduction in [9], many password authentications schemes have been proposed and analysed by crypto community. Contribution of the present paper is two-folded. At first it presents the cryptanalysis results of Ramasamy et al.’s RSA ...

Journal: :I. J. Network Security 2013
Yanjun Liu Chin-Chen Chang Shih-Chang Chang

Because the t-out-of-n oblivious transfer (OT) protocol can guarantee the privacy of both participants, i.e., the sender and the receiver, it has been used extensively in the study of cryptography. Recently, Chang and Lee presented a robust t-out-of-n OT protocol based on the Chinese remainder theorem (CRT). In this paper, we use the Aryabhata remainder theorem (ART) to achieve the functionalit...

2016
You-sheng Zhou Jun-feng Zhou Feng Wang

A privacy-preserving roaming authentication scheme (PPRAS) for ubiquitous networks is proposed, in which a remote mobile user can obtain the service offered by a foreign agent after being authenticated. In order to protect the mobile user’s privacy, the user presents an anonymous identity to the foreign agent with the assistance of his or her home agent to complete the authentication. After tha...

2007
Claudia Eckert

The correct and awless design of cryptographic protocols is crucial for the security of network services. As security aws within such protocols are in general very hard to detect, their security properties must be formally veriied. A computer-supported prove is highly desirable, but formal techniques as well as automatic theorem provers are hard to use for a non-specialist. To ooer a user-frien...

2016
Reham Abdellatif Abouhogail

Improving the Quality of Service (QOS) for the next generation of mobile broadband wireless networks standards; IEEE802.16x becomes the main target for many new researches. This is due to the long time to complete the handover process from the old connection to the new connection in the proposed standard design. In this paper, an improvement to the IEEE 802.11based wireless mesh networks in ter...

2015
Wang Guowei Jia Zongpu Peng Weiping

To solve the problems about securities, absence of calculation pertinence, incapability of making the most of the reader’s computation and storage capacity that emerged in Radio Frequency Identification (RFID) authentication protocols, the paper proposes a Hash function based server/serverless adaptive and mutual authentication protocol of RFID based on the analysis of RFID authentication proto...

2013
Chin-Chen Chang Ting-Fang Cheng T. F. Cheng

Due to the rapid development of the Internet, an increasing number of applications can be implemented using oblivious transfer (OT) as a sub-protocol, such as privacy-preserving auction, secrets exchange, data mining, and e-commerce. Considering the practicability of an OT mechanism, we think that it is also necessary to discuss how to convince a chooser of the integrity and origin of chosen se...

2017
ZHANG Feng

This paper analyzes the rationality, completeness and security of HSASILC protocol. The results show that HSASILC protocol achieves the original design goals. The design protocol is compared with several typical protocols, and shows several advantages. The experimental environment is built and the protocol is verified. Using simulated RTL benchmarking sign level end design, simulation results s...

20042005200620072008200920102011201220132014201520162017201820192020202120222023040008000

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید