نتایج جستجو برای: sadra in man

تعداد نتایج: 16990827  

2002
Maristella Botticini Zvi Eckstein

Since the Middle Ages the Jews have been engaged primarily in urban, skilled occupations, such as crafts, trade, Þnance, and medicine. This distinctive occupational selection occurred between the seventh and the ninth centuries in the Muslim Empire and then it spread to other locations. We argue that this transition was the outcome of the widespread literacy among Jews prompted by an educationa...

Journal: :IACR Cryptology ePrint Archive 2016
Mathilde Igier Serge Vaudenay

Distance Bounding (DB) is designed to mitigate relay attacks. This paper provides a complete study of the DB protocol of Kleber et al. based on Physical Unclonable Functions (PUFs). We contradict the claim that it resists to Terrorist Fraud (TF). We propose some slight modifications to increase the security of the protocol and formally prove TF-resistance, as well as resistance to Distance Frau...

2013
Hailin Chen Zuping Zhang

Increasing evidence has revealed that microRNAs (miRNAs) play important roles in the development and progression of human diseases. However, efforts made to uncover OMIM disease-miRNA associations are lacking and the majority of diseases in the OMIM database are not associated with any miRNA. Therefore, there is a strong incentive to develop computational methods to detect potential OMIM diseas...

1995
Christian Gehrmann

Gemmell and Naor proposed a new protocol for unconditionally secure authentication of long messages. However Gehrmann showed that the proof of the security of the protocol was incorrect. Here we generalize the multiround protocol model. We prove the security of a 3-round protocol and give for this case a new easy implementable construction which has a key size close to the fundamental lower bou...

1964
F. A. GIFFORD

Study of all reported instances of motion of Martian yellow clouds yields a n analysis of thcir probable nature and properties. The yellow clouds seem to be initiated by wind-driven sand and teiid to form in low latitudes. The limb and terminator projections seem to be quite diffcreiit in nature, probably in par t aqucous condensations. Thcse occur primarily in middle latitudes.

Journal: :Des. Codes Cryptography 2007
Alexandre Pinto André Souto Armando Matos Luis Filipe Coelho Antunes

In the present paper, we answer a question raised in the paper Constructions and Bounds for Unconditionally Secure Non-Interactive Commitment Schemes, by Blundo et al, 2002, showing that there is a close relation between unconditionally secure commitment schemes and unconditionally secure authentication schemes, and that an unconditionally secure commitment scheme can be built from such an auth...

1995
Kaoru Kurosawa Satoshi Obana

Unconditionally secure authentication codes with arbitration (A 2 -codes) protect against deceptions from the transmitter and the receiver as well as that from the opponent. In this paper, we present combinatorial lower bounds on the cheating probabilities for A 2 -codes in terms of the number of source states, that of the whole messages and that of messages which the receiver accepts as authen...

2015
Ashish Kumar

.................................................................................. iii TABLE OF CONTENTS................................................................... iv LIST OF FIGURES......................................................................... vii LIST OF TABLES........................................................................... viii

Journal: :I. J. Network Security 2008
Min-Ho Kim Çetin Kaya Koç

Novikov and Kiselev [7] proposed an authentication method of a user from a remote autonomous object. Recently, Yang et al. [12] and Awasthi [1] have pointed out that the Novikov-Kiselev scheme is insecure against the man-in-the-middle attack. In this article, we propose an improved version of the Novikov-Kiselev scheme to overcome such vulnerability.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید