نتایج جستجو برای: armed attack
تعداد نتایج: 92853 فیلتر نتایج به سال:
in this paper, the security of a distance bounding protocol is analyzed which has been recently proposed by jannati and falahati (so-called jf). we prove that an adversary can recover key bits of jf protocol with probability of “1” while the complexity of attack is “2n” runs of protocol. in addition, we propose an improved protocol and prove that the improved protocol is resistant to mafia frau...
Guess and determine attacks are general attacks on stream ciphers. These attacks are classified into ad-hoc and Heuristic Guess and Determine (HGD) attacks. One of the Advantages of HGD attack algorithm over ad-hoc attack is that it is designed algorithmically for a large class of stream ciphers while being powerful. In this paper, we use auxiliary polynomials in addition to the original equati...
Armed conflict has a major impact on child health throughout the world. One in six children worldwide lives in an area of armed conflict and civilians are more likely to die than soldiers as a result of the conflict. In stark contrast to the effect on children, the international arms trade results in huge profits for the large corporations involved in producing arms, weapons and munitions. Arme...
We consider the framework of stochastic multi-armed bandit problems and study the possibilities and limitations of forecasters that perform an on-line exploration of the arms. A forecaster is assessed in terms of its simple regret, a regret notion that captures the fact that exploration is only constrained by the number of available rounds (not necessarily known in advance), in contrast to the ...
F. Heidler Z. Flisowski University of the Federal Armed Forces Munich, Germany University of Technology Warsaw, Poland [email protected] [email protected] W. Zischank Ch. Bouquegneau University of the Federal Armed Forces Munich, Germany Faculté Polytechnique de Mons, Belgium [email protected] [email protected] C. Mazzetti University “La Sapienza”...
This issue brief provides a brief overview of the legal, political, and operational frameworks protecting children from the effects of armed conflict, notably from violations by nonstate armed groups. It explores some of the limitations of these frameworks and their mechanisms, and then discusses ways to maximize the comparative advantages of different actors when engaging nonstate armed groups...
The armed forces of the United States do not and cannot operate in isolation from the larger American society. They are part of a polity whose needs they must serve. Moreover, to win the trust and support of the larger polity, the armed services must be widely perceived as serving important social needs. Without this trust and support, the armed forces will not get the resources they need to fu...
In this survey, we are trying to illustrate rights and liberties of aid workers and medical personnel in the case of an Armed Conflict. In this Regard, at the very outset, legal status of humanitarian aid workers will be descried and then we will elaborate on their sets rights and liberties. At the first instance, the most important factor per se, is accessibility to victims of an armed conflic...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید