نتایج جستجو برای: sadra in man
تعداد نتایج: 16990827 فیلتر نتایج به سال:
This article has no abstract.
Since the Middle Ages the Jews have been engaged primarily in urban, skilled occupations, such as crafts, trade, Þnance, and medicine. This distinctive occupational selection occurred between the seventh and the ninth centuries in the Muslim Empire and then it spread to other locations. We argue that this transition was the outcome of the widespread literacy among Jews prompted by an educationa...
Distance Bounding (DB) is designed to mitigate relay attacks. This paper provides a complete study of the DB protocol of Kleber et al. based on Physical Unclonable Functions (PUFs). We contradict the claim that it resists to Terrorist Fraud (TF). We propose some slight modifications to increase the security of the protocol and formally prove TF-resistance, as well as resistance to Distance Frau...
Increasing evidence has revealed that microRNAs (miRNAs) play important roles in the development and progression of human diseases. However, efforts made to uncover OMIM disease-miRNA associations are lacking and the majority of diseases in the OMIM database are not associated with any miRNA. Therefore, there is a strong incentive to develop computational methods to detect potential OMIM diseas...
Gemmell and Naor proposed a new protocol for unconditionally secure authentication of long messages. However Gehrmann showed that the proof of the security of the protocol was incorrect. Here we generalize the multiround protocol model. We prove the security of a 3-round protocol and give for this case a new easy implementable construction which has a key size close to the fundamental lower bou...
Study of all reported instances of motion of Martian yellow clouds yields a n analysis of thcir probable nature and properties. The yellow clouds seem to be initiated by wind-driven sand and teiid to form in low latitudes. The limb and terminator projections seem to be quite diffcreiit in nature, probably in par t aqucous condensations. Thcse occur primarily in middle latitudes.
In the present paper, we answer a question raised in the paper Constructions and Bounds for Unconditionally Secure Non-Interactive Commitment Schemes, by Blundo et al, 2002, showing that there is a close relation between unconditionally secure commitment schemes and unconditionally secure authentication schemes, and that an unconditionally secure commitment scheme can be built from such an auth...
Unconditionally secure authentication codes with arbitration (A 2 -codes) protect against deceptions from the transmitter and the receiver as well as that from the opponent. In this paper, we present combinatorial lower bounds on the cheating probabilities for A 2 -codes in terms of the number of source states, that of the whole messages and that of messages which the receiver accepts as authen...
.................................................................................. iii TABLE OF CONTENTS................................................................... iv LIST OF FIGURES......................................................................... vii LIST OF TABLES........................................................................... viii
Novikov and Kiselev [7] proposed an authentication method of a user from a remote autonomous object. Recently, Yang et al. [12] and Awasthi [1] have pointed out that the Novikov-Kiselev scheme is insecure against the man-in-the-middle attack. In this article, we propose an improved version of the Novikov-Kiselev scheme to overcome such vulnerability.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید