نتایج جستجو برای: search protocols

تعداد نتایج: 391475  

2012
Masoumeh Safkhani Pedro Peris-Lopez Nasour Bagheri Majid Naderi Julio César Hernández Castro

In this paper, we analyze the security of the mutual authentication and search protocols recently proposed by Tan et al. [20]. Our security analysis clearly highlights important security pitfalls in these. More precisely, privacy location of the tags’ holder is compromised by the authentication protocol. Moreover, the static identifier which represents the most valuable information that a tag s...

Journal: :Math. Program. 2016
Ashwin Nayak Jamie Sikora Levent Tunçel

Coin-flipping is a cryptographic task in which two physically separated, mistrustful parties wish to generate a fair coin-flip by communicating with each other. Chailloux and Kerenidis (2009) designed quantum protocols that guarantee coin-flips with near optimal bias away from uniform, even when one party deviates arbitrarily from the protocol. The probability of any outcome in these protocols ...

Journal: :CoRR 2009
Juha Partala

We show that for every effective left conjugacy closed left quasigroup, there is an induced rack that retains the conjugation structure of the left translations. This means that cryptographic protocols relying on conjugacy search can be secure only if conjugacy search of left translations is infeasible in the induced rack. We note that, in fact, protocols based on conjugacy search could be simp...

Journal: :Otolaryngology--head and neck surgery : official journal of American Academy of Otolaryngology-Head and Neck Surgery 2011
Kenneth W Altman Neil Prufer Michael F Vaezi

OBJECTIVES Gastroesophageal reflux disease (GERD) and laryngopharyngeal reflux (LPR) are very common and controversial diseases. The authors have previously reviewed clinical practice guidelines (CPGs) on reflux disease, and these major consensus statements differ on what constitutes ideal management. The aim is to critically review existing protocols for reflux based on CPG recommendations and...

2005
Ahmed Sobeih Mahesh Viswanathan Darko Marinov Jennifer C. Hou

Traditional network simulators perform well in evaluating the performance of network protocols but lack the capability of verifying the correctness of protocols. To address this problem, we have extended the J-Sim network simulator with a model checking capability that explores the state space of a network protocol to find an execution that violates a safety invariant. In this paper, we demonst...

Journal: :Proceedings. Biological sciences 2012
J McCartney H Kokko K-G Heller D T Gwynne

Sexual selection is thought to have led to searching as a profitable, but risky way of males obtaining mates. While there is great variation in which sex searches, previous theory has not considered search evolution when both males and females benefit from multiple mating. We present new theory and link it with data to bridge this gap. Two different search protocols exist between species in the...

Journal: :Acupuncture in medicine : journal of the British Medical Acupuncture Society 2010
Steve Lui Erica J Smith Mishka Terplan

OBJECTIVE Given the international focus and rigorous literature searches employed in Cochrane systematic reviews, this study was undertaken to evaluate strategies employed in Cochrane reviews and protocols assessing acupuncture as a primary or secondary intervention. METHODS The Cochrane Collaboration of systematic reviews was searched in February 2009 for all reviews and protocols including ...

Journal: :Journal of Computer Security 2012
Hongbin Zhou Simon N. Foley

An automatic security protocol generator is described that useslogic-based heuristic rules to guide it in a backward search for suitableprotocols from protocol goals. The approach taken is unlike exist-ing automatic protocol generators which typically carry out a forwardsearch for candidate protocols from the protocol assumptions. A pro-totype generator has been built th...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید