نتایج جستجو برای: identification key
تعداد نتایج: 936593 فیلتر نتایج به سال:
به منظور جمعآوری و شناسایی فون زنبورهای پارازیتویید متعلق به جنس Förster Encarsia حاشیه جنوبی دریای خزر، مطالعاتی در فاصله سالهای 95-1393 انجام شد. در این بررسی 12 گونه متعلق به این جنس جمعآوری و شناسایی شد که از این میان گونة Encarsia gennaroi Pedata & Giorgini, 2017 برای اولین بار از ایران گزارش میشود و شش گونه برای استان مازندران، سه گونه برای استان گلستان و دو گونه برای استان گیلان گزا...
In order to prevent illegal tracking and stealing personal or cargo information, the authentication services should be provided for the tags to identify a Reader. A NTRU based signature scheme is proposed in this paper, which meets the demand for a group of tags to quickly and securely identify a Reader in RFID system. In our scheme, only the tag in specified group can verify the reader’s messa...
An identification key to 111 species of Tylenchorhynchus is given. Tylenchorhynchus is defined as containing only those species with four incisures in the lateral field. A compendium providing the most important diagnostic characters for use in identification of species is included as a supplement to the key. Some species in a related but unnecessary genus were placed in the genus Tylenchorhync...
This paper describes an attack on an identification scheme based on the permuted perceptron problem (PPP) as suggested by Pointcheval. The attack finds the secret key, a vector of n binary elements, in time much faster than estimated by its designer. The basic idea in the attack is to use several applications of a simulated annealing algorithm and combine the outcomes into an improved search. I...
An identification key to 29 valid species of Hoplolaimus is given. A compendium of the most important diagnostic characters for use in identification of species is included as a practical alternative and supplement to the key. Diagnosis of Hoplolaimus is emended and lists of species of the genus, their synonymies, species inquirendae, nomina nuda, and species transferred to other genera are giv...
An RFID tag could change hands many times during its lifetime. In a retail chain, the ownership of the tag is instituted by the supplier who initially owns the tag. In the view of a buyer, the validity of the current tag ownership and the originality of supplier are most important. In typical RFID ownership transfer protocols, the knowledge of the tag's authentication key proves the ownership. ...
M. Kim and K. Kim [1] introduce a new identification scheme based on the Gap Diffie-Hellman problem, and prove that the scheme is secure against active attacks if the Gap Diffie-Hellman problem is intractable. But, their identification scheme is NOT secure. In this paper, we give the reason that why the scheme is not secure, and we also modify the scheme such that the modified scheme is secure ...
In this paper, we describe two serious weaknesses of an identity-based identification scheme proposed by Girault (presented at Eurocrypt ’90) that enables adversaries to forge identity, key pairs for a large group of users. We also show how to modify the scheme to make the attacks ineffective.
As the Federal Bureau of Investigation starts accepting electronically submitted fingerprints for processing and retention there is a need for a related set of standards. Over the past four years the FBI has developed the necessary standards for the exchange of electronic fingerprint data. Local, state and federal users of FBI identification services will need to understand and employ these sta...
An identification key to 63 species of Pratylenchus is given. A compendium of the most diagnostic characters to be used directly in identification of species is included as a practical alternative and supplement to the key. P. tenuis, P. similis, P. impar, P. ranjani, and P. neocapitatus are recognized as valid species on the basis of study of type specimens. P. hyderabadensis Singh &Gill, 1986...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید