نتایج جستجو برای: security constrained unitcommitment

تعداد نتایج: 252998  

Journal: :I. J. Network Security 2007
Chetan Nanjunda Mathur K. P. Subbalakshmi

The Wired Equivalent Privacy (WEP) uses the 64 bit RC4 secret key stream cipher as its layer 2 security protocol. Although the underlying RC4 cipher is secure, the potential reuse of the same key stream by different frames is a weakness in the WEP. One enhancement to WEP is the Temporal Key Integrity Protocol (TKIP), which acts as a wrapper to the WEP protocol and uses a 128 bit RC4 encryption ...

پایان نامه :دانشگاه تربیت معلم - تهران - دانشکده ادبیات و علوم انسانی 1391

abstract global financial crisis has created too many problems in relations among governments. among these problems, the issue of global monetary management, more than every time in the past four decades, has been moved in the center of international economic attentions. a problem which is specially known with the monetary hostility between united states and public republic of china. where ar...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی 1388

this dissertation has six chapter and tree appendices. chapter 1 introduces the thesis proposal including description of problem, key questions, hypothesis, backgrounds and review of literature, research objectives, methodology and theoretical concepts (key terms) taken the literature and facilitate an understanding of national security, national interest and turkish- israeli relations concepts...

2016
Yanrong Lu Lixiang Li Haipeng Peng Yixian Yang

WSNs (Wireless sensor networks) are nowadays viewed as a vital portion of the IoTs (Internet of Things). Security is a significant issue in WSNs, especially in resource-constrained environments. AKA (Authentication and key agreement) enhances the security of WSNs against adversaries attempting to get sensitive sensor data. Various AKA schemes have been developed for verifying the legitimate use...

Journal: :IACR Cryptology ePrint Archive 2007
Dennis Hofheinz Eike Kiltz

We put forward a new paradigm for building hybrid encryption schemes from constrained chosen-ciphertext secure (CCCA) key-encapsulation mechanisms (KEMs) plus authenticated symmetric encryption. Constrained chosen-ciphertext security is a new security notion for KEMs that we propose. CCCA has less demanding security requirements than standard chosen-ciphertext (CCA) security (since it requires ...

Journal: :International Journal of Research in Engineering and Technology 2013

Journal: :IOP Conference Series: Earth and Environmental Science 2021

Journal: :International Journal of Electrical Power & Energy Systems 2022

The accelerated penetration rate of renewable energy sources (RES) brings environmental benefits at the expense increasing operation cost and undermining satisfaction N-1 security criterion in transmission systems. To address latter issue, this paper envisions control RES dominated power systems through stochastic multi-period AC constrained optimal flow (SCOPF). extends state-of-the-art, i.e. ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید