نتایج جستجو برای: phan privacy model

تعداد نتایج: 2140719  

Journal: :isecure, the isc international journal of information security 0
s. sajjadi ghaemmaghami department of electrical and computer engineering, science and research branch, islamic azad university, tehran, iran a. haghbin department of electrical and computer engineering, science and research branch, islamic azad university, tehran, iran m. mirmohseni department of electrical engineering, sharif university of technology, tehran, iran

radio frequency identification (rfid) applications have spread all over the world. in order to provide their security and privacy, researchers proposed different kinds of protocols. in this paper, we analyze the privacy of a new protocol, proposed by yu-jehn in 2015 which is based on electronic product code class1 generation 2 (epc c1 g2) standard. by applying the ouafi_phan privacy model, we s...

Nowadays Radio Frequency Identification (RFID) systems have appeared in lots of identification and authentication applications. In some sensitive applications, providing secure and confidential communication is very important for end-users. To this aim, different RFID authentication protocols have been proposed, which have tried to provide security and privacy of RFID users. In this paper, we a...

Journal: :IACR Cryptology ePrint Archive 2016
Karim Baghery Behzad Abdolmaleki M. J. Emadi

The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...

B. Abdolmaleki K. Baghery M. J. Emadi

The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...

Journal: :IACR Cryptology ePrint Archive 2015
Seyed Salman Sajjadi GhaemMaghami Afrooz Haghbin Mahtab Mirmohseni

Radio Frequency Identification (RFID) applications have spread all over the world and, in order to provide their security and privacy, researchers proposed different kind of protocols. In this paper, we analyzes the privacy of a new protocol, proposed by YuJehn in 2015 which is based on Electronic Product Code Class1 Generation 2 (EPC C1 G2) standard. By applying the Ouafi-Phan privacy model, w...

Journal: :IACR Cryptology ePrint Archive 2016
Behzad Abdolmaleki Karim Baghery Shahram Khazaei Mohammad Reza Aref

Recently, Radio Frequency Identification (RFID) and Near Field Communication (NFC) systems are found in various user-friendly services that all of us deal with in our daily lives. As these systems are ubiquitously deployed in different authentication and identification applications, inferring information about our behavior will be possible by monitoring our use of them. In order to provide priv...

Journal: :Journal of Non-Newtonian Fluid Mechanics 2019

Journal: :journal of applied and computational mechanics 0
naeem faraz shanghai university, shanghai china hou lei shanghai university, shanghai china yasir khan hafr al batin saudia arabia

an attempt is made for the first time to solve the quadratic and cubic model of magneto hydrodynamic poiseuille flow of phan-thein-tanner (ptt). series solution of magneto hydrodynamic (mhd) flow is developed by using homotopy perturbation method (hpm). results are presented graphically and the effects of non-dimensional parameters on the flow field are analyzed. the results obtained reveals ma...

Journal: :CoRR 2016
Seyed Salman Sajjadi GhaemMaghami Afrooz Haghbin Mahtab Mirmohseni

Radio Frequency IDentification (RFID) is a pioneer technology which has depicted a new lifestyle for humanity in all around the world. Every day we observe an increase in the scope of RFID applications and no one cannot withdraw its numerous usage around him/herself. An important issue which should be considered is providing privacy and security requirements of an RFID system. Recently in 2014,...

1995
Richard Waites Andrew Hudson

To understand better the mechanisms that lead to dorsoventrality in the lateral organs of plants, mutants at the phantastica (phan) locus of Antirrhinum majus have been identified and characterised. The leaves, bracts and petal lobes of phan mutants show varying degrees of reduction in dorsal tissues, indicating that phan is required for establishing dorsal cell identity. Each phan mutant produ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید