نتایج جستجو برای: untrusted relay
تعداد نتایج: 19885 فیلتر نتایج به سال:
to evaluate the yield components, yield and land equivalent ratio affected by relay intercropping of sunflower (helianthus annuus l.) with faba bean (vicia faba l.), a field experiment was arranged based on a randomized complete block design with three replications at the agricultural research station payamenoor university of nagadeh, iran during growing reason of 2012-2013. the treatments incl...
results linear mixed model analyses showed that athletes slept on average 43 minutes longer when they slept during usual (night) times than during abnormal (day) times. in general, sleep duration decreased during the race with on average 18 minutes per period. conclusions this pilot study shows that, even under extreme violation of sleep hygiene rules, there still is an apparent effect of circa...
Transcript is a system that enhances JavaScript with support for transactions. Hosting Web applications can use transactions to demarcate regions that contain untrusted guest code. Actions performed within a transaction are logged and considered speculative until they are examined by the host and committed. Uncommitted actions simply do not take and cannot affect the host in any way. Transcript...
We present a secure service prototype built from untrusted, contributed code. The service manages private data for a variety of different users, and user programs frequently require access to other users’ private data. However, aside from covert timing channels, no part of the service can corrupt private data or leak it between users or outside the system without permission from the data’s owne...
IEEE 802.16 standard is created to compete with cable access networks. In the beginning end users are immobile and have a line of sight with base station, now it moved to mobile non line of sight (NLOS) with the new standard IEEE 802.16e and IEEE 802.16j. The new IEEE 802.16j standard which is an amendment to IEEE 802.16e is mobile multi hop relay (MMR) specification for wireless networks. This...
The wireless ad hoc network (WANET) is a type of wireless network in which some nodes are decentralized as well as self-organized in a wireless local area network. In recent years, insider threats increasingly damage the works not only in computer information systems, but also many wireless communications systems e.g. WANETs. We must take into consideration that the majority of insider threats ...
Distance-bounding protocols form a family of challenge–response authentication protocols that have been introduced to thwart relay attacks. They enable a verifier to authenticate and to establish an upper bound on the physical distance to an untrusted prover. We provide a detailed security analysis of a family of such protocols. More precisely, we show that the secret key shared between the ver...
An efficient numerical method for the design and synthesis of compensator for a relay type control system is developed and discussed. Previous works based on the interactive graphic method are reviewed and it is shown that the combination of the trequency and time domain numerical techniques provide a powerful tool in design of a wide class of relay control systems. An example is presented to d...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید