نتایج جستجو برای: pake

تعداد نتایج: 151  

ژورنال: اعتیاد پژوهی 2016
دیاریان, محمد مسعود, محمدی, شیما,

Objective: This study aimed to investigate the effectiveness of sexual health behaviors training on sexual dysfunction of addicted women. Methods: A semi-experimental research method with pre-posttest with witness group design was used. The research population included all women were recovering addict in rehab centers of Attar, Sepahan, Pake Mehre and Conger 60 in 2015 in Isfahan. To select a s...

Journal: :Iet Information Security 2023

This is our first IET Information Security special issue from the Internation Conference on and Cryptology, which was held December 1 to 3, Seoul, South Korea, 2021. The aim of ICISC 2021 provide an international forum for latest results research, development, applications within field information security cryptography. In 2021, we received 63 submissions were able accept 23 papers presentation...

Journal: :Proceedings of the National Academy of Sciences of the United States of America 1955
W Gordy W B Ard H Shields

I For a description of the phenomena of magnetic resonance see W. Gordy, W. V. Smith, and R. F. Trambarulo, Microwave Spectroscopy (New York: John Wiley & Sons, Inc., 1953), chap. v. See also chap. ii. by W. Gordy, of Chemical Applications of Spectroscopy, soon to be published by Interscience Publishers, Inc., in the "Techniques of Organic Chemistry" series, ed. A. Weissberger. 2 B. Commoner, J...

Journal: :J. Inf. Sci. Eng. 2011
Shuhua Wu

This paper investigates verifier-based password authenticated key exchange (PAKE) protocols in the three party setting. We first show that the protocol recently proposed by Li et al. is vulnerable to off-line dictionary attack and unknown key-share attack. Moreover, we also show that the direct elliptic curve (EC) analog of the DL based protocol proposed by Kwon et al. can’t resist the off-line...

2017
Wei-Chuen Yau Bok-Min Goi

Password-Authenticated Key Exchange (PAKE) protocols allow parties to share secret keys in an authentic manner based on an easily memorizable password. Recently, Nam et al. showed that a provably secure three-party passwordbased authenticated key exchange protocol using Weil pairing by Wen et al. is vulnerable to a man-in-the-middle attack. In doing so, Nam et al. showed the flaws in the proof ...

2018
Wei-Chuen Yau Bok-Min Goi

Password-Authenticated Key Exchange (PAKE) protocols allow parties to share secret keys in an authentic manner based on an easily memorizable password. Recently, Nam et al. showed that a provably secure three-party passwordbased authenticated key exchange protocol using Weil pairing by Wen et al. is vulnerable to a man-in-the-middle attack. In doing so, Nam et al. showed the flaws in the proof ...

Journal: :IACR Cryptology ePrint Archive 2014
Charanjit S. Jutla Arnab Roy

We introduce a novel concept of dual-system simulation-sound non-interactive zero-knowledge (NIZK) proofs. Dual-system NIZK proof system can be seen as a two-tier proof system. As opposed to the usual notion of zero-knowledge proofs, dual-system defines an intermediate partialsimulation world, where the proof simulator may have access to additional auxiliary information about the potential lang...

Journal: :Connection science 2021

In cloud storage, public auditing is a more popular data integrity verification technique since it allows users to delegate tasks fully trusted third-party auditor (TPA). However, difficult find such TPA in practical application. Besides, the centralised model makes have bear burdensome work pressure, which limits practicability of existing schemes. this paper, we firstly proposed blockchain-ba...

2017
Wei-Chuen Yau Bok-Min Goi

Password-Authenticated Key Exchange (PAKE) protocols allow parties to share secret keys in an authentic manner based on an easily memorizable password. Recently, Nam et al. showed that a provably secure three-party passwordbased authenticated key exchange protocol using Weil pairing by Wen et al. is vulnerable to a man-in-the-middle attack. In doing so, Nam et al. showed the flaws in the proof ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید