نتایج جستجو برای: adversary legal system
تعداد نتایج: 2314073 فیلتر نتایج به سال:
چکیده ندارد.
چکیده ندارد.
Radio frequency identification (RFID) technologies have many advantages in applications such as object tracking and monitoring, ticketing, supply-chain management, contactless payment systems. However, the RFID system may bring about various security and privacy problems. In this paper we present our security analysis of the LAK protocol and the CWH protocol. First, we show that the LAK protoco...
legal establishment of court is the birth of social life; each person should define him/herself against others offence or violation. when a society forms and the legal character appears, the thought of society refers to a person name prosecuting attorney who is the president of the court for defending his/her rights. prosecuting attorney remindterms such as court, crime and punishment. accordi...
Biometric-based authentication systems are widely deployed for person identification. Recently, an improved scheme for flexible biometrics remote user authentication was proposed by Khan and Zhang. In this paper, we demonstrate that Khan-Zhang’s scheme is still vulnerable to the following two attacks: (1) It is insecure to parallel session attack in which an adversary without knowing a legal us...
abstract the problems caused by the traditional system of criminal justice (which are based on remuneration and rehabilitation) such as, lack of attention to victim’s rights and position and society, underlie the emergence of restorative justice which had the victim-centered perspective, with respect to the role of the offender and participation of civil society. meanwhile, criminal mediation ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید