نتایج جستجو برای: ban analysis
تعداد نتایج: 2829750 فیلتر نتایج به سال:
The famous BAN paper [3] determined the research agenda of security-protocol verification for nearly a decade. Many others had worked on verifying security protocols, and the problem appeared to be intractable. The real-world systems were too complicated; too many different things could go wrong; the formal treatments were unusable. The BAN logic was abstract, formalizing intuitive notions dire...
OBJECTIVES As of October 2009, seven U.S. states and the District of Columbia (D.C.) ban driving while talking on a handheld cell phone. Long-term effects on driver handheld phone use in D.C., New York State, and Connecticut were examined. METHODS The percentage of drivers talking on handheld cell phones was measured over time with daytime observation surveys in the jurisdictions with bans an...
BACKGROUND Ban Huang oral liquid was developed as a veterinary compound preparation by the Lanzhou Institute of Husbandry and Pharmaceutical Sciences of the Chinese Academy of Agricultural Sciences (CAAS). The purpose of this study was to determine whether the oral liquid preparation of traditional Chinese medicine, Ban Huang, is safe and effective for treating respiratory diseases in cattle. ...
Background and Purpose. The association between smoking and CV has been proved; however smoking is still the first preventable cause of death in the EU. We aim to evaluate the potential impact of the smoke ban on the number of ACS events in the Portuguese population. In addition, we evaluate the longitudinal effects of the smoking ban several years after its implementation. Methods. We analyzed...
hydrolysate, soy and conventional cow milk formulas on incidence of atopic disease in high risk infants. Annals of Allergy 1989; 63: 102–6. 4 Chandra R. Five-year follow-up of high risk infants with family history of allergy who were exclusively breastfed or fed partial whey hydrolysate, soy and conventional cow’s milk formulas. Journal of Pediatriatric Gastroenterology and Nutrition 1997; 24: ...
In wireless ad hoc networks environment, Bellovin and Merritt first developed a password-based Encrypted Key Exchange (EKE) protocol against offline dictionary attacks using both symmetric and public-key cryptography independent of the public key infrastructure (PKI). In this paper, we first discover that there exist some weaknesses in EKE protocol that is subjected to imposter attacks based on...
Background Exposure to secondhand smoke, according to the World Health Organization is responsible for 603,000 deaths in 2004. The ban on smoking in public places in Greece was legislated but not implemented, as the adequate and effective measures were not taken. This study aims to determine the degree of acceptance of the last anti-smoking law and the parameters associated with the acceptance ...
The Yahalom protocol is one of those analyzed by Burrows et al. [5]. Based upon their analysis, they have proposed modifications to make the protocol easier to understand and to analyze. Both versions of Yahalom have now been analyzed using Isabelle/HOL. Modified Yahalom satisfies strong security goals, and the original version is adequate. The mathematical reasoning behind these machine proofs...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید