نتایج جستجو برای: key technology

تعداد نتایج: 980060  

Journal: :DEStech Transactions on Social Science, Education and Human Science 2018

Journal: :PDA Journal of Pharmaceutical Science and Technology 2017

Journal: :BMC Women's Health 2021

Abstract Background Information and communications technologies (ICTs) have empowered people to communicate network at a global scale. However, there is lack of in-depth understanding the use ICTs for women's empowerment. This study examines how concept empowerment defined, utilized measured in research studies, existing evidence on women’s gaps knowledge level. Methods The authors’ conducted s...

Journal: :civil engineering infrastructures journal 0
bita analui phd candidate, institute of statistics and operations research (isor), university of vienna, vienna, austria. raimund kovacevic phd, institute of statistics and operations research (isor), university of vienna, vienna,austria.

multistage stochastic programming is a key technology for making decisions over time in an uncertain environment. one of the promising areas in which this technology is implementable, is medium term planning of electricity production and trading where decision makers are typically faced with uncertain parameters (such as future demands and market prices) that can be described by stochastic proc...

Journal: :IACR Cryptology ePrint Archive 2008
Dan Boneh David Mandell Freeman Jonathan Katz Brent Waters

Network coding offers increased throughput and improved robustness to random faults in completely decentralized networks. In contrast to traditional routing schemes, however, network coding requires intermediate nodes to modify data packets en route; for this reason, standard signature schemes are inapplicable and it is a challenge to provide resilience to tampering by malicious nodes. We propo...

Journal: :Comput. J. 2013
Aikaterini Mitrokotsa Pedro Peris-Lopez Christos Dimitrakakis Serge Vaudenay

Distance-bounding protocols form a family of challenge–response authentication protocols that have been introduced to thwart relay attacks. They enable a verifier to authenticate and to establish an upper bound on the physical distance to an untrusted prover. We provide a detailed security analysis of a family of such protocols. More precisely, we show that the secret key shared between the ver...

2006
Marc Joye Pascal Paillier

The generation of prime numbers underlies the use of most public-key cryptosystems, essentially as a primitive needed for the creation of RSA key pairs. Surprisingly enough, despite decades of intense mathematical studies on primality testing and an observed progressive intensification of cryptography, prime number generation algorithms remain scarcely investigated and most real-life implementa...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید