نتایج جستجو برای: and third

تعداد نتایج: 16842781  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه فردوسی مشهد - دانشکده ادبیات و علوم انسانی دکتر علی شریعتی 1391

this ethnographic case study research was carried out in a private school setting in the context of iran. the research tried to explore the analysis and identity construction of a group of learners and teachers along with the content analysis of books on the basis of four types of commodified, political, national and narrative identities. how english language learners and teachers in an informa...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه یزد - دانشکده جغرافیا 1392

the west of esfahan province, iran, is one of the most important agricultural areas throughout the country due to the climate variability and life-giving water of zayanderood river. rice is one of the major and economic crops in this area. the most important climatic elements in agricultural activities which should be considered include temperature, relative humidity, precipitation and wind. so...

2005
Jan Camenisch Susan Hohenberger Anna Lysyanskaya

This paper presents efficient off-line anonymous e-cash schemes where a user can withdraw a wallet containing 2 coins each of which she can spend unlinkably. Our first result is a scheme, secure under the strong RSA and the y-DDHI assumptions, where the complexity of the withdrawal and spend operations is O(`+k) and the user’s wallet can be stored using O(`+k) bits, where k is a security parame...

2003
Chih-Hung Wang

A fair network payment protocol plays an important role in electronic commerce. The fairness concept in payments can be illustrated as that two parties (e.g. customers and merchants) exchange the electronic items (e.g. electronic money and goods) with each other in a fair manner that no one can gain advantage over the other even if there are malicious actions during exchanging process. In the p...

Journal: :Journal of Computer Security 2006
Guilin Wang

A non-repudiation protocol enables the fair exchange of an electronic message and an irrefutable digital receipt between two mistrusting parties over the Internet. That is, at the end of any execution instance of such a protocol, either both parties obtain their expected items or neither party does. In this paper, we first argue that it is really meaningful in practice to exploit generic fair n...

2002
H. Kopetz

TTP/C and FlexRay are two protocols that have been designed for use in time-triggered systems for safety-critical applications. This paper investigates the fault-containment and error-detection mechanisms of safety-critical time-triggered systems that are based on these two protocols. The following critical failure modes of a fault-containment region are introduced and analyzed in detail: babbl...

Journal: :IEICE Transactions 2007
Chun-Ping Chen Deming Xu Zhewang Ma Tetsuo Anada

Two-Thickness-Method (TTM) based on an open-ended coaxial probe was investigated with an emphasis on uncertainty analysis to perfect this technique. Uncertainty equations in differential forms are established for the simultaneous measurement of complex electromagnetic (EM) parameters in the systematical consideration of various error factors in measurement. Worst-case differential uncertainty e...

Journal: :dental research journal 0
sujata byahatti mohammed. s. h. ingafou

background: the aim of the present study is to determine the number of third molars per person, angulation, level, amount of space for eruption of third molar between ramus of mandible and second molar and the eruption status of third molar in a group of libyan students, with different impaction patterns and agenesis of third molars. materials and methods: in this descriptive retrospective stud...

2004
Latanya Sweeney Michael Shamos

Consider a set of players who wish to randomly arrange themselves without a trusted third-party. For example, if there are 3 players, a, b and c, then a trusted third party could order them as abc, acb, bac, bca, cab, or cba. In the absence of a trusted third party, the players want to select one of these permutations for themselves at random. In this writing, a protocol (named “RandomSelect”) ...

2007
Sébastien Canard Aline Gouget

This paper presents an off-line divisible e-cash scheme where a user can withdraw a divisible coin of monetary value 2 that he can parceled and spend anonymously and unlinkably. We present the construction of a security tag that allows to protect the anonymity of honest users and to revoke anonymity only in case of cheat for protocols based on a binary tree structure without using a trusted thi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید