نتایج جستجو برای: untrusted relay

تعداد نتایج: 19885  

Journal: :به زراعی کشاورزی 0
اسماعیل رضائی چیانه استادیار گروه گیاهان دارویی، دانشکدۀ کشاورزی، مرکز آموزش عالی شهید باکری میاندوآب، دانشگاه ارومیه، ارومیه، ایران و مدرس گروه زراعت، دانشکدۀ کشاورزی، دانشگاه پیام نور مرکز نقده، نقده، ایران سرور خرم دل استادیار گروه زراعت و اصلاح نباتات، دانشکدۀ کشاورزی، دانشگاه فردوسی مشهد، مشهد، ایران پریسا قره چالی دانشجوی کارشناسی گروه زراعت، دانشکدۀ کشاورزی، دانشگاه پیام نور مرکز نقده، نقده، ایران

to evaluate the yield components, yield and land equivalent ratio affected by relay intercropping of sunflower (helianthus annuus l.) with faba bean (vicia faba l.), a field experiment was arranged based on a randomized complete block design with three replications at the agricultural research station payamenoor university of nagadeh, iran during growing reason of 2012-2013. the treatments incl...

Journal: :asian journal of sports medicine 0
annette van maanen research institute of child development and education, university of amsterdam, amsterdam, the netherlands; research institute of child development and education, university of amsterdam, p. o. box: 15776, amsterdam, the netherlands. tel: +31-205251235, fax: +31-205251500 bas roest centre for sleep-wake disorders and chronobiology, gelderse vallei hospital, ede, the netherlands maarten moen high performance team, noc*nsf, arnhem, the netherlands frans oort research institute of child development and education, university of amsterdam, amsterdam, the netherlands peter vergouwen elite sports medicine, gelderse vallei hospital, ede, the netherlands ingrid paul elite sports medicine, gelderse vallei hospital, ede, the netherlands

results linear mixed model analyses showed that athletes slept on average 43 minutes longer when they slept during usual (night) times than during abnormal (day) times. in general, sleep duration decreased during the race with on average 18 minutes per period. conclusions this pilot study shows that, even under extreme violation of sleep hygiene rules, there still is an apparent effect of circa...

2012
Mohan Dhawan Chung-chieh Shan Vinod Ganapathy

Transcript is a system that enhances JavaScript with support for transactions. Hosting Web applications can use transactions to demarcate regions that contain untrusted guest code. Actions performed within a transaction are logged and considered speculative until they are examined by the host and committed. Uncommitted actions simply do not take and cannot affect the host in any way. Transcript...

2007
Micah Brodsky Petros Efstathopoulos Frans Kaashoek Eddie Kohler Maxwell Krohn David Mazieres Robert Morris Steve VanDeBogart Alexander Yip David Mazières

We present a secure service prototype built from untrusted, contributed code. The service manages private data for a variety of different users, and user programs frequently require access to other users’ private data. However, aside from covert timing channels, no part of the service can corrupt private data or leak it between users or outside the system without permission from the data’s owne...

2012
D. Satish

IEEE 802.16 standard is created to compete with cable access networks. In the beginning end users are immobile and have a line of sight with base station, now it moved to mobile non line of sight (NLOS) with the new standard IEEE 802.16e and IEEE 802.16j. The new IEEE 802.16j standard which is an amendment to IEEE 802.16e is mobile multi hop relay (MMR) specification for wireless networks. This...

Journal: :J. Internet Serv. Inf. Secur. 2014
Hsing-Chung Chen Hui-Kai Su

The wireless ad hoc network (WANET) is a type of wireless network in which some nodes are decentralized as well as self-organized in a wireless local area network. In recent years, insider threats increasingly damage the works not only in computer information systems, but also many wireless communications systems e.g. WANETs. We must take into consideration that the majority of insider threats ...

Journal: :Comput. J. 2013
Aikaterini Mitrokotsa Pedro Peris-Lopez Christos Dimitrakakis Serge Vaudenay

Distance-bounding protocols form a family of challenge–response authentication protocols that have been introduced to thwart relay attacks. They enable a verifier to authenticate and to establish an upper bound on the physical distance to an untrusted prover. We provide a detailed security analysis of a family of such protocols. More precisely, we show that the secret key shared between the ver...

An efficient numerical method for the design and synthesis of compensator for a relay type control system is developed and discussed. Previous works based on the interactive graphic method are reviewed and it is shown that the combination of the trequency and time domain numerical techniques provide a powerful tool in design of a wide class of relay control systems. An example is presented to d...

Journal: :International Journal of Security and Its Applications 2016

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید