نتایج جستجو برای: armed attack

تعداد نتایج: 92853  

Journal: :journal of electrical and computer engineering innovations 2014
fatemeh baghernejad nasour bagheri masoumeh safkhani

in this paper, the security of a distance bounding protocol is analyzed which has been recently proposed by jannati and falahati (so-called jf). we prove that an adversary can recover key bits of jf protocol with probability of “1” while the complexity of attack is “2n” runs of protocol. in addition, we propose an improved protocol and prove that the improved protocol is resistant to mafia frau...

اقلیدس, ترانه, نعمتی نیا, محمد صادق, پاینده, علی,

Guess and determine attacks are general attacks on stream ciphers. These attacks are classified into ad-hoc and Heuristic Guess and Determine (HGD) attacks. One of the Advantages of HGD attack algorithm over ad-hoc attack is that it is designed algorithmically for a large class of stream ciphers while being powerful. In this paper, we use auxiliary polynomials in addition to the original equati...

2012
Michael Rieder Imti Choonara

Armed conflict has a major impact on child health throughout the world. One in six children worldwide lives in an area of armed conflict and civilians are more likely to die than soldiers as a result of the conflict. In stark contrast to the effect on children, the international arms trade results in huge profits for the large corporations involved in producing arms, weapons and munitions. Arme...

2010
Sébastien Bubeck Rémi Munos Gilles Stoltz

We consider the framework of stochastic multi-armed bandit problems and study the possibilities and limitations of forecasters that perform an on-line exploration of the arms. A forecaster is assessed in terms of its simple regret, a regret notion that captures the fact that exploration is only constrained by the number of available rounds (not necessarily known in advance), in contrast to the ...

2008
F. Heidler Z. Flisowski C. Mazzetti

F. Heidler Z. Flisowski University of the Federal Armed Forces Munich, Germany University of Technology Warsaw, Poland [email protected] [email protected] W. Zischank Ch. Bouquegneau University of the Federal Armed Forces Munich, Germany Faculté Polytechnique de Mons, Belgium [email protected] [email protected] C. Mazzetti University “La Sapienza”...

Journal: :Nature 2012

2012
Jérémie Labbé

This issue brief provides a brief overview of the legal, political, and operational frameworks protecting children from the effects of armed conflict, notably from violations by nonstate armed groups. It explores some of the limitations of these frameworks and their mechanisms, and then discusses ways to maximize the comparative advantages of different actors when engaging nonstate armed groups...

1999

The armed forces of the United States do not and cannot operate in isolation from the larger American society. They are part of a polity whose needs they must serve. Moreover, to win the trust and support of the larger polity, the armed services must be widely perceived as serving important social needs. Without this trust and support, the armed forces will not get the resources they need to fu...

ژورنال: حقوق پزشکی 2015
تاور, اسماعیل, جودکی, بهزاد, عظیمی, فاطمه,

In this survey, we are trying to illustrate rights and liberties of aid workers and medical personnel in the case of an Armed Conflict. In this Regard, at the very outset, legal status of humanitarian aid workers will be descried and then we will elaborate on their sets rights and liberties. At the first instance, the most important factor per se, is accessibility to victims of an armed conflic...

Journal: :The New England journal of medicine 2013
Gregor Pollach

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید