نتایج جستجو برای: key
تعداد نتایج: 553708 فیلتر نتایج به سال:
herein, we present the case of a child with acute lymphoblastic leukaemia who simultaneously developed probable invasive aspergillosis and was diagnosed with gi mucormycosis by histopathologic examination. the patient referred to the pediatric intensive ca re unit of ege university due to clinical deterioration and severe lower gastrointestinal system bleeding. main symptoms were abdominal dist...
inflammatory condition is the consequence of defensive mechanism of immune system against viral and bacterial infection, tissue injury, uv radiation, stress and etc. persistently acute inflammation leads to chronic phase which is characterized by production of pro-inflammatory mediators from t cells. these molecules (e.g. il-6, tnf-α, il-1β and il-17) are mostly pleiotropic cytokines involved i...
0
Many services in a distributed public network like the Internet require secure communications. Security in communications consists of confidentiality, integrity, authenticity, and non-repudiability. These aims can be achieved with cryptography. Key management plays a fundamental role in secure communications, as it is the basis of all cryptographic functions. This paper describes a pattern lang...
Design secure Authenticated Key Exchange (AKE) protocol without NAXOS approach is remaining as an open problem. NAXOS approach [4] is used to hide the secret ephemeral key from an adversary even if the adversary in somehow may obtain the ephemeral secret key. Using NAXOS approach will cause two main drawbacks, (i) leaking of the static secret key which will be used in computing the exponent of ...
This document describes a key management protocol variant for the Multimedia Internet KEYing (MIKEY) protocol that relies on a trusted key management service. In particular, this variant utilizes Identity-Based Authenticated Key Exchange (IBAKE) framework that allows the participating clients to perform mutual authentication and derive a session key in an asymmetric Identity-Based Encryption (I...
Password-based authenticated group key exchange allows any group of users in possession of a low-entropy secret key to establish a common session key even in the presence of adversaries. In this paper, we propose a new generic construction of password-authenticated group key exchange protocol from any two-party password-authenticated key exchange with explicit authentication. Our new constructi...
The generation of the multi-key-pair in the RSA iterative encryption system was studied, and from the generation algorithm of key, a sort of multi-key-pair generation scheme was proposed in the article. In the scheme, the encryption key set and the decryption key set used in the encryption system were managed by the improved half-generation algorithm, and the management scheme that one secrete ...
The security provided by the XCBC, TMAC and OMAC schemes is analysed and compared with other MAC schemes. In particular, ‘partial’ key recovery attacks against all three of these schemes are described, yielding upper bounds on the effective security level. The results imply that there is relatively little to be gained practically through the introduction of these schemes by comparison with othe...
We show that a linear decomposition attack based on the decomposition method introduced by the author in monography [1] and paper [2] works by finding the exchanging keys in the both two main protocols in [3] and [4].
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید