نتایج جستجو برای: bilateral authentication

تعداد نتایج: 117646  

2013
Andrei A. Levchenko Jing Zhang

This paper investigates both aggregate and distributional impacts of the trade integration of China, India, and Central and Eastern Europe in a quantitative multi-country multi-sector model, comparing outcomes with and without factor market frictions. Under perfect withincountry factor mobility, the gains to the rest of the world from trade integration of emerging giants are 0.37%, ranging from...

2009
Isabel Cristina Boleli Zilil Luz Paulino-Simoes

Serotonin-immunoreactive neurons were identified in the central nervous system (CNS) of Anaslrepha obliquo Macqualt, 1835 wandering stage larvae. The PAP immunocytochemical method was applied to the entire CNS (whole mounts). About 90 neurons were visualized in the CNS (20 in the brain and 70 in the ventral ganglion). Both somata and axons were strongly stained. These neurons showed a segmental...

2012
Andrei A. Levchenko Jing Zhang

This paper investigates both aggregate and distributional impacts of the trade integration of China, India, and Central and Eastern Europe in a quantitative multi-country multi-sector model, comparing outcomes with and without factor market frictions. Under perfect withincountry factor mobility, the gains to the rest of the world from trade integration of emerging giants are 0.37%, ranging from...

Journal: :Journal of Multimedia 2014
Lihua Zhang Xichang Dai Youjin Shen

In order to solve network security problem, we need identity authentication protocol to ensure legal user’s authority. Multi-factor identity authentication protocols have more merits than the common identity authentication protocol. This paper analyzes the shortcomings of existing network identity authentication methods, and proposes a new authentication protocol based on SM2 and fingerprint US...

2003
Hahnsang Kim Walid Ben-Ameur Hossam Afifi

Many hierarchical mobility schemes have been proposed for the Internet. They all seek to improve the hand-off especially when the mobile terminal is moving relatively far from its point of attachment. Some simulations have been presented for their models, but none has addressed security problems. Moreover, these solutions address only the improvement of mobility without studying the impact of a...

Journal: :IEEE Journal on Selected Areas in Communications 1993
Li Gong

Authentication is a process by which one satisses another about one's claim of identity. Typically an authentication server provides the authentication service via an authentication protocol. The authentication service is a security bottleneck in that its compromise can lead to the compromise of the whole system. The service is also a performance bottleneck because many activities cannot procee...

Journal: :Journal of Multimedia 2014
Zhongsheng Qiu Fangfang Zhang Yuan Zhou

In order to solve network security problem, we need identity authentication protocol to ensure legal user’s authority. Multi-factor identity authentication protocols have more merits than the common identity authentication protocol. This paper analyzes the shortcomings of existing network identity authentication methods, and proposes a new authentication protocol based on SM2 and fingerprint US...

2011
Hung-Min Sun Bing-Zhe He Shih-Ying Chang Chun-Hua Cho

In a Universal Mobile Telecommunications System (UMTS), a user equipment (UE) can access IP multimedia services through IP Multimedia Subsystems (IMS). In addition to passing IMS authentication, called IMS AKA, this UE also needs to pass General Packet Radio Service (GPRS) authentication, called 3GPP AKA, since the data of the IMS service is transmitted through a GPRS network. Many steps in the...

Journal: :The Yale Journal of Biology and Medicine 1948
Robert B. Livingston

Although this book is difficult to read and even more difficult to review, it represents a remarkable amount of work in a difficult field, yet it may be that the semantic difficulties imposed added to a tendency toward obscure writing will greatly restrict the influence of the book. Mr. Halstead has gathered together a battery of tests, most of which he devised himself, which appear to be neuro...

Journal: :IBM Systems Journal 2001
Nalini K. Ratha Jonathan H. Connell Ruud M. Bolle

Because biometrics-based authentication offers several advantages over other authentication methods, there has been a significant surge in the use of biometrics for user authentication in recent years. It is important that such biometrics-based authentication systems be designed to withstand attacks when employed in security-critical applications, especially in unattended remote applications su...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید