نتایج جستجو برای: protocol
تعداد نتایج: 250013 فیلتر نتایج به سال:
as a response to a growing interest in rfid systems such as internet of things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. hence, authentication protocols to increase security and privacy in rfid applications have gained much attention in the literature. in this study, security and privac...
In this paper, the security of a distance bounding protocol is analyzed which has been recently proposed by Jannati and Falahati (so-called JF). We prove that an adversary can recover key bits of JF protocol with probability of “1” while the complexity of attack is “2n” runs of protocol. In addition, we propose an improved protocol and prove that the improved protocol is resistant to mafia frau...
introduction visual skills are one of the main pillars of intangible faculties of athletes that can influence their performance. great number of vision tests used to assess the visual skills and it will be irrational to perform all vision tests for every sport. objectives the purpose of this protocol article is to present a relatively comprehensive battery of tests and assessments on static and...
چکیده ندارد.
Two parties that conduct a business transaction through the internet do not see each other personally nor do they exchange any document neither any money hand-to-hand currency. Electronic payment is a way by which the two parties transfer the money through the internet. Therefore integrity of payment and order information of online purchase is an important concern. With online purchase the cust...
Background To compare a flexible, multi-dose GnRH antagonist protocol with a long GnRH .agonist protocol in poor respo MaterialsAndMethods A randomized clinical trial of 70 poor responder patients (35 patients in GnRH antagonist protocol and 35 patients in long GnRH agonist protocol) was performed at Royan Institute, Tehran, Iran. Both groups were given a fixed dose of human menopausal gonadotr...
introduction: this research was aimed at examining acute responses of hormones such as growth hormone (gh), total testosterone (tt), free testosterone (ft), free fatty acid (ffa) and cortisol to resistance (r), endurance (e) and endurance-resistance (er) exercise. methods: the participants of this study were 10 healthy young men. r protocol included bench press, lateral pull down, leg extension...
Reverse engineering of network applications especially from the security point of view is of high importance and interest. Many network applications use proprietary protocols which specifications are not publicly available. Reverse engineering of such applications could provide us with vital information to understand their embedded unknown protocols. This could facilitate many tasks including d...
Recently, Baghery et al. [1, 2] presented some attacks on two RFID protocols, namely Yoon and Jung et al. protocols, and proposed the improved version of them. However, in this note, we show that the improved version of the Jung et al. protocol suffers from desynchronization attack and the improved version of the Yoon's protocol suffers from secret disclosure attack. The succe...
Introduction: This research was aimed at examining acute responses of hormones such as growth hormone (GH), total testosterone (TT), free testosterone (FT), free fatty acid (FFA) and cortisol to resistance (R), endurance (E) and endurance-resistance (ER) exercise. Methods: The participants of this study were 10 healthy young men. R protocol included bench press, lateral pull down, leg exten...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید