نتایج جستجو برای: pake
تعداد نتایج: 151 فیلتر نتایج به سال:
Cloud computing is an emerging technology that provide people a way to share large amount of hardware and software resources that belong to different organizations. Maintaining privacy and security in cloud environment is more complicated. Mitigating threats in a distributed computing environment is a difficult task as it requires constant vigilance and defense-in-depth. Most systems lack a sec...
* This work was supported in part by the Office of Naval Research and by research grant C-3983 from the National Cancer Institute, U. S. Public Health Service. l Commoner, B., J. Townsend, and G. E. Pake, Nature, 174, 689 (1954). 2 Commoner, B., J. J. Heise, and J. Townsend, these PROCEEDINGS, 42, 710 (1956). Commoner, B., J. J. Heise, B. B. Lippincott, R. E. Norberg, J. V. Passonneau, and J. T...
This paper considers security analysis of a cross-realm client-to-client password-authenticated key exchange (C2C-PAKE) protocol with indirect communication structure that was proposed for secure email. The protocol does not need any public key infrastructure (PKI) and was designed to enable senders and recipients of emails to register at different mail servers. However, mail servers require sh...
Smooth projective hash functions have been used as building block for various cryptographic applications, in particular for password-based authentication. In this work we propose the extended concept of distributed smooth projective hash functions where the computation of the hash value is distributed across n parties and show how to instantiate the underlying approach for languages consisting ...
Tujuan penelitian ini untuk membahas tentang bagaimana agar manusia bisa berkarakter dan berbudi luhur menurut teori Ki Hajar Dewantara dimulai dari sejak Paud. Metode yang saya pake adalah metode kuantitatif dengan pendekatan deskriptif analisis disini mengumpulkan beberapa materi berbagai sumber, jurnal buku lalu mengkaji/mendalami – sudah kumpulkan. konsep pemikiran Dewantara, pendidikan mer...
The current study explores the variations of formant frequency English vowels produced by eighty students BS and language at NUML International Islamic University Islamabad. research defines acoustic monophthongal under influence gender four standard regional varieties Pakistan presents a macro-level description Monophthongs Pakistani English. respondents belong to Balochi, Pushto, Punjabi, Sin...
The multiple ideal query (MIQ) model [Goyal, Jain, and Ostrovsky, Crypto’10] offers a relaxed notion of security for concurrent secure computation, where the simulator is allowed to query the ideal functionality multiple times per session (as opposed to just once in the standard definition). The model provides a quantitative measure for the degradation in security under concurrent self-composit...
<em>Education broadens students' grasp of all disciplines. Nationalism is one the most intriguing concerns Indonesian students confront today. Today's are more technologically savvy, allowing them to get global information quickly. As technology advances rapidly, educators must guide and persuade learn about culture. One cultures they can Betawi Teachers could ask read culture using their...
Abstract This work is focused on the effects of drying/re-saturation cycles structure and components White Portland Cement (WPC) samples. In particular, WPC 0.5 water-to-cement ratio was studied by 1 H Nuclear Magnetic Resonance (NMR) Relaxometry. A number NMR sequences different data processing methods were applied. Short (14 days re-saturation) long (6 months for whole cycle) sorption investi...
Password-only authentication is one of the most popular secure mechanisms for real-world online applications. But it easily suffers from a practical threat - password leakage, incurred by external and internal attackers. The attacker may compromise file stored on server, insider deliberately steal passwords or inadvertently leak passwords. So far, there are two main techniques to address leakag...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید