نتایج جستجو برای: ban logic
تعداد نتایج: 157888 فیلتر نتایج به سال:
This paper analyzes the effects of a ban on smoking in public places upon firms and consumers. Analysis of survey data from public houses finds that the Scottish smoking ban (introduced in March 2006) reduced pub sales and harmed medium run profitability. An event study analysis of the stock market performance of pub-holding companies corroborates the negative effects of the smoking ban on firm...
The Proxy Mobile IPv6 (PMIPv6) is a network-based mobility management protocol that allows a Mobile Node(MN) connected to the PMIPv6 domain to move from one network to another without changing the assigned IPv6 address. The user authentication procedure in this protocol is not standardized, but many smartcard based authentication schemes have been proposed. Recently, Alizadeh et al. proposed an...
Password authentication schemes are one of the most commonly used solution to protect resources in network environment from unauthorized access. Since, their first introduction in [9], many password authentications schemes have been proposed and analysed by crypto community. Contribution of the present paper is two-folded. At first it presents the cryptanalysis results of Ramasamy et al.’s RSA ...
Because the t-out-of-n oblivious transfer (OT) protocol can guarantee the privacy of both participants, i.e., the sender and the receiver, it has been used extensively in the study of cryptography. Recently, Chang and Lee presented a robust t-out-of-n OT protocol based on the Chinese remainder theorem (CRT). In this paper, we use the Aryabhata remainder theorem (ART) to achieve the functionalit...
A privacy-preserving roaming authentication scheme (PPRAS) for ubiquitous networks is proposed, in which a remote mobile user can obtain the service offered by a foreign agent after being authenticated. In order to protect the mobile user’s privacy, the user presents an anonymous identity to the foreign agent with the assistance of his or her home agent to complete the authentication. After tha...
The correct and awless design of cryptographic protocols is crucial for the security of network services. As security aws within such protocols are in general very hard to detect, their security properties must be formally veriied. A computer-supported prove is highly desirable, but formal techniques as well as automatic theorem provers are hard to use for a non-specialist. To ooer a user-frien...
Improving the Quality of Service (QOS) for the next generation of mobile broadband wireless networks standards; IEEE802.16x becomes the main target for many new researches. This is due to the long time to complete the handover process from the old connection to the new connection in the proposed standard design. In this paper, an improvement to the IEEE 802.11based wireless mesh networks in ter...
To solve the problems about securities, absence of calculation pertinence, incapability of making the most of the reader’s computation and storage capacity that emerged in Radio Frequency Identification (RFID) authentication protocols, the paper proposes a Hash function based server/serverless adaptive and mutual authentication protocol of RFID based on the analysis of RFID authentication proto...
Due to the rapid development of the Internet, an increasing number of applications can be implemented using oblivious transfer (OT) as a sub-protocol, such as privacy-preserving auction, secrets exchange, data mining, and e-commerce. Considering the practicability of an OT mechanism, we think that it is also necessary to discuss how to convince a chooser of the integrity and origin of chosen se...
This paper analyzes the rationality, completeness and security of HSASILC protocol. The results show that HSASILC protocol achieves the original design goals. The design protocol is compared with several typical protocols, and shows several advantages. The experimental environment is built and the protocol is verified. Using simulated RTL benchmarking sign level end design, simulation results s...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید