نتایج جستجو برای: search protocols
تعداد نتایج: 391475 فیلتر نتایج به سال:
—Many RFID authentication protocols have been developed in recent years. However, most require the reader to search all tags in the system to identify a single tag. This problem makes the protocols impractical in large-scale RFID deployments. To address this problem, we propose a privacypreserving mutual authentication protocol for RFID systems with constant-time identification, based on Quadr...
This paper introduces the wireless sensor network routing protocol and its security, and introduces the main several kinds of routing protocols, including the data centric routing protocol, hierarchical routing protocols and location-based routing protocol, finally according to the analysis of routing protocol common attack method. Ant colony algorithm is a distributed parallel algorithm. A sin...
Model checking has been used to verify the correctness of digital circuits, security protocols, communication protocols, as they can be modelled by means of finite state transition model. However, modelling the behaviour of hybrid systems like UAVs in a Kripke model is challenging. This work is aimed at capturing the behaviour of an UAV performing cooperative search mission into a Kripke model,...
This report deals with the time and energy analysis for RFID arbitration protocols. The goal is to analyse and compare various RFID arbitration algorithms. Two protocols are detailed in here – The tree search algorithm of Capetanakis and a non-monotonic windowing protocol. A new simpler proof is given for the expected time complexity of the tree splitting protocol and the worst case energy cons...
In recent years, Artin’s braid groups have undergone intense scrutiny as a possible cryptographic platform, due mainly to the key-exchange protocols proposed in [1] and [12]. The security of both of these protocols relies on the difficulty of variants of the conjugacy search problem in braid groups, a well-studied problem (see [9], [6], [10]). More recently, Dehornoy has proposed a zero-knowled...
the aim of this study was to compare the efficiency of five synchronization protocols, economically, in holstein cows during heat stress. this experiment was conducted at a commercial dairy farm in summer 2015 (temperature humidity index 73–81). five hundred holstein dairy cows with ˃25 kg/d milk yield were randomly assigned to five experimental groups: 1) ovsynch; 2) presynch-ovsynch; 3) doubl...
underwater acoustic wireless sensor network (uawsn) use acoustic signalsto transmit data. acoustic signals in underwater environment have high bit errorrate, long propagation delay and limited bandwidth. another constraint in uwasnis energy. due to these constraints, design of energy and bandwidth efficient andpropagation delay aware mac protocol is a great challenge in uwasn.underwater sensor ...
background: paraquat poisoning is a medical emergency challenge due to its inherent severe toxicity and unavailability of specific antidote for it. in this paper, a series of patients who were treated according to a commonly used treatment flowchart are presented. methods: this prospective observational study was carried out on paraquat poisoned patients admitted to district hospital, chamaraja...
Vehicular ad hoc networks (VANETs) have attracted growing interest in both academia and industry because they can provide a viable solution that improves road safety comfort for travelers on roads. However, wireless communications over open-access environments face many security privacy issues may affect deployment of large-scale VANETs. Researchers proposed different protocols to address VANET...
radio frequency identification (rfid) applications have spread all over the world. in order to provide their security and privacy, researchers proposed different kinds of protocols. in this paper, we analyze the privacy of a new protocol, proposed by yu-jehn in 2015 which is based on electronic product code class1 generation 2 (epc c1 g2) standard. by applying the ouafi_phan privacy model, we s...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید