نتایج جستجو برای: search protocols

تعداد نتایج: 391475  

Journal: :JCM 2015
Jingxian Zhou

—Many RFID authentication protocols have been developed in recent years. However, most require the reader to search all tags in the system to identify a single tag. This problem makes the protocols impractical in large-scale RFID deployments. To address this problem, we propose a privacypreserving mutual authentication protocol for RFID systems with constant-time identification, based on Quadr...

2014
Fengjuan Liu

This paper introduces the wireless sensor network routing protocol and its security, and introduces the main several kinds of routing protocols, including the data centric routing protocol, hierarchical routing protocols and location-based routing protocol, finally according to the analysis of routing protocol common attack method. Ant colony algorithm is a distributed parallel algorithm. A sin...

2009
Gopinadh Sirigineedi Antonios Tsourdos Brian A. White Rafal Zbikowski

Model checking has been used to verify the correctness of digital circuits, security protocols, communication protocols, as they can be modelled by means of finite state transition model. However, modelling the behaviour of hybrid systems like UAVs in a Kripke model is challenging. This work is aimed at capturing the behaviour of an UAV performing cooperative search mission into a Kripke model,...

2006
Rohan Jude Fernandes

This report deals with the time and energy analysis for RFID arbitration protocols. The goal is to analyse and compare various RFID arbitration algorithms. Two protocols are detailed in here – The tree search algorithm of Capetanakis and a non-monotonic windowing protocol. A new simpler proof is given for the expected time complexity of the tree splitting protocol and the worst case energy cons...

Journal: :Groups Complexity Cryptology 2009
Jonathan Longrigg Alexander Ushakov

In recent years, Artin’s braid groups have undergone intense scrutiny as a possible cryptographic platform, due mainly to the key-exchange protocols proposed in [1] and [12]. The security of both of these protocols relies on the difficulty of variants of the conjugacy search problem in braid groups, a well-studied problem (see [9], [6], [10]). More recently, Dehornoy has proposed a zero-knowled...

Journal: :تولیدات دامی 0
عیسی دیرنده گروه علوم دامی، دانشگاه علوم کشاورزی و منابع طبیعی ساری، ساری، ایران

the aim of this study was to compare the efficiency of five synchronization protocols, economically, in holstein cows during heat stress. this experiment was conducted at a commercial dairy farm in summer 2015 (temperature humidity index 73–81). five hundred holstein dairy cows with ˃25 kg/d milk yield were randomly assigned to five experimental groups: 1) ovsynch; 2) presynch-ovsynch; 3) doubl...

Journal: :journal of advances in computer research 2014
reza mohammadi seyyed yahya nabavi reza javidan

underwater acoustic wireless sensor network (uawsn) use acoustic signalsto transmit data. acoustic signals in underwater environment have high bit errorrate, long propagation delay and limited bandwidth. another constraint in uwasnis energy. due to these constraints, design of energy and bandwidth efficient andpropagation delay aware mac protocol is a great challenge in uwasn.underwater sensor ...

Journal: :asia pacific journal of medical toxicology 0
devanur rajashekhara murthy mahadeshwara prasad department of forensic medicine and toxicology, district hospital and chamarajanagar institute of medical sciences, chamarajanagar, karnataka, india abhilash chennabasappa shimoga institute of medical science, shimoga, karnataka, india

background: paraquat poisoning is a medical emergency challenge due to its inherent severe toxicity and unavailability of specific antidote for it. in this paper, a series of patients who were treated according to a commonly used treatment flowchart are presented. methods: this prospective observational study was carried out on paraquat poisoned patients admitted to district hospital, chamaraja...

Journal: :Computers, materials & continua 2022

Vehicular ad hoc networks (VANETs) have attracted growing interest in both academia and industry because they can provide a viable solution that improves road safety comfort for travelers on roads. However, wireless communications over open-access environments face many security privacy issues may affect deployment of large-scale VANETs. Researchers proposed different protocols to address VANET...

Journal: :isecure, the isc international journal of information security 0
s. sajjadi ghaemmaghami department of electrical and computer engineering, science and research branch, islamic azad university, tehran, iran a. haghbin department of electrical and computer engineering, science and research branch, islamic azad university, tehran, iran m. mirmohseni department of electrical engineering, sharif university of technology, tehran, iran

radio frequency identification (rfid) applications have spread all over the world. in order to provide their security and privacy, researchers proposed different kinds of protocols. in this paper, we analyze the privacy of a new protocol, proposed by yu-jehn in 2015 which is based on electronic product code class1 generation 2 (epc c1 g2) standard. by applying the ouafi_phan privacy model, we s...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید