نتایج جستجو برای: pake

تعداد نتایج: 151  

2014
Anitha Kumari Sudha Sadasivam Ali A. Yassin Hai Jin Ayad Ibrahim Weizhong Qiang Deqing Zou Hongwei Li Yuanshun Dai Ling Tian Haomiao Yang Yun Ding Zhiguo Wan Robert H. Deng Feng Bao

Cloud computing is an emerging technology that provide people a way to share large amount of hardware and software resources that belong to different organizations. Maintaining privacy and security in cloud environment is more complicated. Mitigating threats in a distributed computing environment is a difficult task as it requires constant vigilance and defense-in-depth. Most systems lack a sec...

Journal: :Proceedings of the National Academy of Sciences of the United States of America 1961
M SANTER D C TELLER L SKILNA

* This work was supported in part by the Office of Naval Research and by research grant C-3983 from the National Cancer Institute, U. S. Public Health Service. l Commoner, B., J. Townsend, and G. E. Pake, Nature, 174, 689 (1954). 2 Commoner, B., J. J. Heise, and J. Townsend, these PROCEEDINGS, 42, 710 (1956). Commoner, B., J. J. Heise, B. B. Lippincott, R. E. Norberg, J. V. Passonneau, and J. T...

Journal: :Security and Communication Networks 2015
Mohsen Toorani

This paper considers security analysis of a cross-realm client-to-client password-authenticated key exchange (C2C-PAKE) protocol with indirect communication structure that was proposed for secure email. The protocol does not need any public key infrastructure (PKI) and was designed to enable senders and recipients of emails to register at different mail servers. However, mail servers require sh...

Journal: :IACR Cryptology ePrint Archive 2014
Franziskus Kiefer Mark Manulis

Smooth projective hash functions have been used as building block for various cryptographic applications, in particular for password-based authentication. In this work we propose the extended concept of distributed smooth projective hash functions where the computation of the hash value is distributed across n parties and show how to instantiate the underlying approach for languages consisting ...

Journal: :Jurnal Pelita Paud 2022

Tujuan penelitian ini untuk membahas tentang bagaimana agar manusia bisa berkarakter dan berbudi luhur menurut teori Ki Hajar Dewantara dimulai dari sejak Paud. Metode yang saya pake adalah metode kuantitatif dengan pendekatan deskriptif analisis disini mengumpulkan beberapa materi berbagai sumber, jurnal buku lalu mengkaji/mendalami – sudah kumpulkan. konsep pemikiran Dewantara, pendidikan mer...

Journal: :Pakistan journal of social research 2023

The current study explores the variations of formant frequency English vowels produced by eighty students BS and language at NUML International Islamic University Islamabad. research defines acoustic monophthongal under influence gender four standard regional varieties Pakistan presents a macro-level description Monophthongs Pakistani English. respondents belong to Balochi, Pushto, Punjabi, Sin...

2014
Ran Canetti Vipul Goyal Abhishek Jain

The multiple ideal query (MIQ) model [Goyal, Jain, and Ostrovsky, Crypto’10] offers a relaxed notion of security for concurrent secure computation, where the simulator is allowed to query the ideal functionality multiple times per session (as opposed to just once in the standard definition). The model provides a quantitative measure for the degradation in security under concurrent self-composit...

Journal: :Faktor: Jurnal Ilmiah Kependidikan e-journal 2022

<em>Education broadens students' grasp of all disciplines. Nationalism is one the most intriguing concerns Indonesian students confront today. Today's are more technologically savvy, allowing them to get global information quickly. As technology advances rapidly, educators must guide and persuade learn about culture. One cultures they can Betawi Teachers could ask read culture using their...

Journal: :Applied Magnetic Resonance 2021

Abstract This work is focused on the effects of drying/re-saturation cycles structure and components White Portland Cement (WPC) samples. In particular, WPC 0.5 water-to-cement ratio was studied by 1 H Nuclear Magnetic Resonance (NMR) Relaxometry. A number NMR sequences different data processing methods were applied. Short (14 days re-saturation) long (6 months for whole cycle) sorption investi...

Journal: :IEEE Transactions on Information Forensics and Security 2023

Password-only authentication is one of the most popular secure mechanisms for real-world online applications. But it easily suffers from a practical threat - password leakage, incurred by external and internal attackers. The attacker may compromise file stored on server, insider deliberately steal passwords or inadvertently leak passwords. So far, there are two main techniques to address leakag...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید