نتایج جستجو برای: broadcast authentication

تعداد نتایج: 63999  

2016
P. Sangeetha

By utilizing the broadcast nature of radio channels, cooperative wireless communications exploits a brand new degree of freedom to combat unfavorable wireless channel conditions with the help of relays. The transmission reliableness and rates achieved by cooperation for various communication eventualities and cooperation schemes are extensively studied. However, additionally to the benefits it ...

Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...

Journal: :Environmental Modelling and Software 2010
Stefano Marsili-Libelli

The 8th International Symposium on Sanitary and Environmental Engineering (SIDISA 08) was held in Florence, Italy, on June 24–28, 2008 and hosted a special session on the applications of modelling and automation to water and wastewater treatment processes. The session, under the auspices of IWA, ISWA Italy, GE Water & Process Technologies and many other local institutions, was attended by over ...

2008
Jon A. Solworth

PKI has a history of very poor support for revocation. It is both too expensive and too coarse grained, so that private keys which are compromised or otherwise become invalid remain in use long after they should have been revoked. This paper considers Instant Revocation, or revocations which take place within a second or two. A new revocation scheme, Certificate Push Revocation (CPR) is describ...

2010
S. Sakane K. Kamada S. Zrelli

This document provides background information regarding large-scale Kerberos deployments in the industrial sector, with the aim of identifying issues in the current Kerberos cross-realm authentication model as defined in RFC 4120. This document describes some examples of actual large-scale industrial systems, and lists requirements and restrictions regarding authentication operations in such en...

Journal: :CoRR 2014
Zhengjun Cao Lihua Liu

The primitive of private broadcast encryption introduced by Barth, Boneh and Waters, is used to encrypt a message to several recipients while hiding the identities of the recipients. In their construction, a recipient has to first decrypt the received ciphertext to extract the verification key for one-time signature. He then uses the verification key to check whether the ciphertext is malformed...

2016
Lalit Agarwal Hassan Khan Urs Hengartner

Re-authenticating users may be necessary for smartphone authentication schemes that leverage user behaviour, device context, or task sensitivity. However, due to the unpredictable nature of re-authentication, users may get annoyed when they have to use the default, non-transparent authentication prompt for re-authentication. We address this concern by proposing several re-authentication configu...

2007
Scott R. Ross Javier Moltó Rosario Poy Pilar Segarra M. Carmen Pastor Susana Montañés

Gray’s two-factor model represents motivation in terms of a behavioral inhibition (BIS) and a behavioral activation system (BAS). Although this model has theoretical links to psychopathy, few studies have examined this relationship. In a sample of 326 noninstitutionalized young adults, we examined the relationship of the BIS/BAS dimensions to multiple indices of primary and secondary psychopath...

Journal: :RFC 2010
Shoichi Sakane Kenichi Kamada Saber Zrelli Masahiro Ishiyama

This document provides background information regarding large-scale Kerberos deployments in the industrial sector, with the aim of identifying issues in the current Kerberos cross-realm authentication model as defined in RFC 4120. This document describes some examples of actual large-scale industrial systems, and lists requirements and restrictions regarding authentication operations in such en...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید