نتایج جستجو برای: known meta

تعداد نتایج: 876085  

Journal: :IEEE Computer 2014
David Alan Grier

I lied to the future last night. I told it that soon it would be big and strong and profitable. I then tucked it into its crib, turned off the lights, and hoped the day would never come when the future would curse this lie. I not only assured the future it would someday be strong and profitable, I also told it how it would strong and profitable. My lie was a little more prosaic than my words su...

Journal: :Computers & Electrical Engineering 2012
Lili Liu Qiang Zhang Xiaopeng Wei

Recently, a RGB image encryption algorithm based on DNA encoding and chaos map has been proposed. It was reported that the encryption algorithm can be broken with four pairs of chosen plain-images and the corresponding cipher-images. This paper re-evaluates the security of the encryption algorithm, and finds that the encryption algorithm can be broken efficiently with only one known plain-image...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده حقوق 1392

abstract the problems caused by the traditional system of criminal justice (which are based on remuneration and rehabilitation) such as, lack of attention to victim’s rights and position and society, underlie the emergence of restorative justice which had the victim-centered perspective, with respect to the role of the offender and participation of civil society. meanwhile, criminal mediation ...

1998
Colin Boyd Anish Mathuria

We analyse several well-known key establishment protocols for mobile communications. The protocols are examined with respect to their security and suitability in mobile environments. In a number of cases weaknesses are pointed out, and in many cases reenements are suggested, either to improve the eeciency or to allow simpliied security analysis.

Journal: :IACR Cryptology ePrint Archive 2004
Adam J. Slagell

One of the approaches to deliver real-time video encryption is to apply permutations to the bytes within a frame of a fully encoded MPEG stream as presented in [2]. We demonstrate that this particular algorithm is vulnerable to a known-plaintext attack, and hence its use should be carefully considered. We also discuss modifications that can make the algorithm resistant to our attack.

Journal: :Discrete Mathematics & Theoretical Computer Science 2013
Josef Slapal

In the classical approach to digital topology (see e.g. [12] and [13]), graph theoretic tools are used for structuring Z, namely the well-known binary relations of 4-adjacency and 8-adjacency. But neither 4adjacency nor 8-adjacency itself allows an analogue of the Jordan curve theorem (cf. [9]) and, therefore, one has to use a combination of the two adjacencies. To overcome this disadvantage, a...

2002
Atsuko Miyaji Masao Nonaka Yoshinori Takii

Journal: :journal of medical education 0
shahram yazdani somayeh akbari farmad

background and purpose: consideringbackground and purpose: considering the importance and necessity of competency-based education at a global level and with respect to globalization and the requirement of minimum competencies in medical fields, medical education communities and organizations worldwide have tried to determine the competencies, present frameworks and education models to respond t...

1998
Don Coppersmith David A. Wagner Bruce Schneier John Kelsey

Ding et al [DNRS97] propose a stream generator based on several layers. We present several attacks. First, we observe that the non-surjectivity of a linear combination step allows us to recover half the key with minimal effort. Next, we show that the various bytes are insufficiently mixed by these layers, enabling an attack similar to those on two-loop Vigenere ciphers to recover the remainder ...

Journal: تعلیم و تربیت 2019
E. Mohammadyaari, S. Hosseyniyaan, Ph.D.,

A Meta-Analysis of the Effectiveness of Solution-Based Group Counseling in Iranian Schools over the Past Decade   E. Mohammadyaari* S. Hosseyniyaan, Ph.D.**   During the past decade many researchers have studied the effectiveness of solution-based group counseling in improving characteristics such as self-efficacy, social adaptation, and academic motivation among school age children. Many ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید