نتایج جستجو برای: key pre

تعداد نتایج: 847114  

پایان نامه :موسسه آموزش عالی غیردولتی رودکی تنکابن - دانشکده ادبیات و زبانهای خارجی 1383

abstract this study examined the relationship between noticing pronunciation and the improvement pronunciation by administering a 50 item story, as proficiency- test in order to investigate the effectiveness of noticing pronunciation on the improvement of pronunciation. accordingly 60 qualified students were selected and assigned to the two groups of experimental and control randomly, each gr...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان همدان - دانشکده ادبیات و علوم انسانی 1390

abstract this study is an attempt to determine the effect of nano- technology education on science lesson for fifth grade in primary school in the city of kermanshah. this research is experimental and is conducted in the from of pre-test and post- test for the control group. an achievement test was administered to determine the rate of learning in the students. the research is an applied one. ...

2016
Constance R. Chu

Dear Editor: The article on “Pre-Osteoarthritis: Definition and Diagnosis of an Elusive Clinical Entity” by Ryd et al. is of great interest and importance. The concept and definition of “pre-osteoarthritis” has been a focus of my research program for more than a decade. Some of our prior work was summarized in an open access article from 2012 titled “Early Diagnosis to Enable Early Treatment of...

Communication security of wireless sensor networks is achieved using cryptographic keys assigned to the nodes. Due to resource constraints in such networks, random key pre-distribution schemes are of high interest. Although in most of these schemes no location information is considered, there are scenarios that location information can be obtained by nodes after their deployment. In this paper,...

Journal: :Advances in Science, Technology and Engineering Systems Journal 2021

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان تهران - دانشکده حقوق 1389

abstract the third millennium has started, but the world is facing with serious challenges in achieving international security and peace. various human rights violations have lead the states to find means to protect human rights. also article 55 of the united nations charter introduces the respect to human rights and fundamental freedom as the most suitable ways to realize peace and security. ...

Key distribution is an important problem in wireless sensor networks where sensor nodesare randomly scattered in adversarial environments.Due to the random deployment of sensors, a list of keys must be pre-distributed to each sensor node before deployment. To establish a secure communication, two nodes must share common key from their key-rings. Otherwise, they can find a key- path in which ens...

Journal: :IACR Cryptology ePrint Archive 2016
Benjamin Dowling Marc Fischlin Felix Günther Douglas Stebila

We analyze the handshake protocol of TLS 1.3 draft-ietf-tls-tls13-10 (published October 2015). This continues and extends our previous analysis (CCS 2015, Cryptology ePrint Archive 2015) of former TLS 1.3 drafts (draft-ietf-tls-tls13-05 and draft-ietf-tls-tls13-dh-based). Here we show that the full (EC)DHE Diffie–Hellman-based handshake of draft-10 is also secure in the multi-stage key exchange...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید