نتایج جستجو برای: search protocols
تعداد نتایج: 391475 فیلتر نتایج به سال:
In this paper, we analyze the security of the mutual authentication and search protocols recently proposed by Tan et al. [20]. Our security analysis clearly highlights important security pitfalls in these. More precisely, privacy location of the tags’ holder is compromised by the authentication protocol. Moreover, the static identifier which represents the most valuable information that a tag s...
Coin-flipping is a cryptographic task in which two physically separated, mistrustful parties wish to generate a fair coin-flip by communicating with each other. Chailloux and Kerenidis (2009) designed quantum protocols that guarantee coin-flips with near optimal bias away from uniform, even when one party deviates arbitrarily from the protocol. The probability of any outcome in these protocols ...
We show that for every effective left conjugacy closed left quasigroup, there is an induced rack that retains the conjugation structure of the left translations. This means that cryptographic protocols relying on conjugacy search can be secure only if conjugacy search of left translations is infeasible in the induced rack. We note that, in fact, protocols based on conjugacy search could be simp...
OBJECTIVES Gastroesophageal reflux disease (GERD) and laryngopharyngeal reflux (LPR) are very common and controversial diseases. The authors have previously reviewed clinical practice guidelines (CPGs) on reflux disease, and these major consensus statements differ on what constitutes ideal management. The aim is to critically review existing protocols for reflux based on CPG recommendations and...
Traditional network simulators perform well in evaluating the performance of network protocols but lack the capability of verifying the correctness of protocols. To address this problem, we have extended the J-Sim network simulator with a model checking capability that explores the state space of a network protocol to find an execution that violates a safety invariant. In this paper, we demonst...
Sexual selection is thought to have led to searching as a profitable, but risky way of males obtaining mates. While there is great variation in which sex searches, previous theory has not considered search evolution when both males and females benefit from multiple mating. We present new theory and link it with data to bridge this gap. Two different search protocols exist between species in the...
OBJECTIVE Given the international focus and rigorous literature searches employed in Cochrane systematic reviews, this study was undertaken to evaluate strategies employed in Cochrane reviews and protocols assessing acupuncture as a primary or secondary intervention. METHODS The Cochrane Collaboration of systematic reviews was searched in February 2009 for all reviews and protocols including ...
An automatic security protocol generator is described that useslogic-based heuristic rules to guide it in a backward search for suitableprotocols from protocol goals. The approach taken is unlike exist-ing automatic protocol generators which typically carry out a forwardsearch for candidate protocols from the protocol assumptions. A pro-totype generator has been built th...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید