نتایج جستجو برای: protocol analysis

تعداد نتایج: 3017806  

Journal: :Human-Computer Interaction 2001
Dario D. Salvucci John R. Anderson

This article describes and evaluates a class of methods for performing automated analysis of eye-movement protocols. Although eye movements have become increasingly popular as a tool for investigating user behavior, they can be extremely difficult and tedious to analyze. In this article we propose an approach to automating eye-movement protocol analysis by means of tracing—relating observed eye...

2009
David Wagner Bruce Schneier

The SSL protocol is intended to provide a prac tical application layer widely applicable connection oriented mechanism for Internet client server com munications security This note gives a detailed tech nical analysis of the cryptographic strength of the SSL protocol A number of minor aws in the protocol and several new active attacks on SSL are presented however these can be easily corrected w...

2007
Judson Santiago Laurent Vigneron

Non-repudiation protocols with session labels have a number of vulnerabilities. Recently Cederquist, Corin and Dashti have proposed an optimistic non-repudiation protocol that avoids altogether the use of session labels. We have specified and analysed this protocol using an extended version of the AVISPA Tool and one important fault has been discovered. We describe the protocol, the analysis me...

2001
P C Matthews S Ahmed M Aurisicchio

Protocol Analysis provides a means for extracting a person’s thoughts while they are performing a task. This paper used this method for generating an index of keywords based on the transcript generated through protocol analysis of an engineer working on a design project. An algorithm for processing such a body of text is described. The means for analyzing the index to form a network of keywords...

2006
Roberto Zunino Chris Hankin Luca Viganò

We consider secrecy and authentication in a simple process calculus with cryptographic primitives. The standard Dolev–Yao adversary is enhanced so that it can guess the key required to decrypt an intercepted message. We borrow from the computational complexity approach the assumptions that guessing succeeds with a given negligible probability and that the resources available to adversaries are ...

Journal: :Building of Informatics, Technology and Science (BITS) 2022

Dynamic Multipoint Virtual Private Network (DMVPN) technology is one of Cisco's solutions to overcome the limitations VPN scalability. DMVPN has a combination components: Next hop resolution protocol (NHRP), Generic Routing Encapsulation (mGRE) and protocol. This research implements simple network consisting Hub, Spoke1, Spoke2, Lan1, Lan2 Lan3 using GNS3 simulator. study compares performance I...

Introduction: This study aimed to evaluate the effectiveness of Exposure/Response Prevention (ERP) combined with Eye Movement Desensitization Reprocessing (EMDR) as a treatment for obsessive-compulsive disorder (OCD) patients who experienced stressful life events (SLEs), by comparison to ERP. Methods: This randomized controlled trial was conducted on 60 OCD patients who experienced SLEs and wer...

Behzad Ghonsooly Mohammad Ali Shams

The present study aims to investigate language learners’ cognitive processes in on-line ESP courses. Three modes of inquiry are used: think-aloud protocol analysis, screen capture analysis, and correlation analysis. The theoretical foundations for the evaluation of the cognitive aspect of Ferdowsi Univeristy of Mashhad E-learning System are drawn from cognitive load theory, cognitive apprentice...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه فردوسی مشهد - دانشکده ادبیات و علوم انسانی دکتر علی شریعتی 1391

this ethnographic case study research was carried out in a private school setting in the context of iran. the research tried to explore the analysis and identity construction of a group of learners and teachers along with the content analysis of books on the basis of four types of commodified, political, national and narrative identities. how english language learners and teachers in an informa...

Journal: :journal of electrical and computer engineering innovations 2014
fatemeh baghernejad nasour bagheri masoumeh safkhani

in this paper, the security of a distance bounding protocol is analyzed which has been recently proposed by jannati and falahati (so-called jf). we prove that an adversary can recover key bits of jf protocol with probability of “1” while the complexity of attack is “2n” runs of protocol. in addition, we propose an improved protocol and prove that the improved protocol is resistant to mafia frau...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید