نتایج جستجو برای: ident

تعداد نتایج: 404  

2010
Robert McCall

Previous laboratory research has demonstrated that symbolic highway signs which have undergone the Recursive Blur Technique of visual enhancement exhibit significantly increased legibility distances over standard symbolic highway signs when using a critical detail identification task. This study sought to extend those findings to a new stimulus subset, and develop an identification task that is...

2002
Brian D. Carrier Clay Shields

We introduce a new protocol designed to assist in the forensic investigation of malicious network-based activity, specifically addressing the stepping-stone scenario in which an attacker uses a chain of connections through many hosts to hide his or her identity. Our protocol, the Session TOken Protocol (STOP), enhances the Identification Protocol (ident) infrastructure by sending recursive requ...

2004
Jean-Sébastien Coron David Naccache

We present a cryptanalysis of a zero-knowledge identification protocol introduced by Naccache et al. at Eurocrypt ’95. Our cryptanalysis enables a polynomial-time attacker to pass the identification protocol with probability one, without knowing the private key.

2011
Albert Fernàndez-Mir Rolando Trujillo-Rasua Jordi Castellà-Roca Josep Domingo-Ferrer

RFID systems allow fast and automatic identification of RFID tags through a wireless channel. Information on product items like name, model, purpose, expiration date, etc., can be easily stored and retrieved from RFID tags attached to items. That is why, in the near future, RFID tags can be an active part of our everyday life when interacting with items around us. Frequently, such items may cha...

Journal: :J. Mathematical Cryptology 2009
Jiang Wu Douglas R. Stinson

In this paper, first we discuss the security model for deterministic challenge-response identification protocols. For such protocols, we are able to simplify the CR2 security model in [2] which captures concurrent attacks and reset attacks. Then we propose an extremely simple identification protocol and prove that its CR2 security is equivalent to the hardness of the Strong Diffie-Hellman problem.

2014
DAVID KINNEY Chris Mullins

The tic k e ts o f F ra n k Flynn/Nikki Wellman and David R e in ke /L a ra D ickey earned spots in a Wednesday ru n -o ff fo r Notre Dame student body p res ident and vice p res ident a fte r no t ic k e t c a p tu re d a m a jo rity in M onday’s general election. Flynn/Wellman received 35.1 p e rcen t (1,451 votes) o f the electorate, while Reinke/Dickey received 32.5 percent (1,343) — and th...

1993
Ee-Peng Lim Jaideep Srivastava Satya Prabhakar James Richardson

The objective of ent i ty identification i s t o determine the correspondence between object instances f r o m more than one database. This paper ezamines the problem at the instance level assuming that schema level heterogeneity has been resolved a priori . Soundness and completeness are defined as the desired properties of any ent i ty identification technique. To achieve soundness, a set of ...

Journal: :Canadian Anaesthetists' Society journal 1983
A L Stevenson

A little girl, Linda Collins, cut her finger while playing. Taken to hospital to have it sutured she was routinely tested for tetanus antitoxin sensitivity. Within minutes she was in violent anaphylactic shock. It was touch and go for several days. The year was 1956, the place l'urlock, California. Linda's father, Dr. Marion Collins, decided then that a distinctive ident must be devised to prev...

2012
Jens Bender Özgür Dagdelen Marc Fischlin Dennis Kügler

The restricted identification protocol for the new German identity card basically provides a method to use pseudonyms such that they can be linked by individual service providers, but not across different service providers (even not malicious ones). The protocol can be augmented to allow also for signatures under the pseudonyms. In this paper, we thus view —and define— this idea more abstractly...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید