نتایج جستجو برای: secrets divins
تعداد نتایج: 4175 فیلتر نتایج به سال:
One of the current issues raised by HIV/AIDS is the phenomenon of serodiscordance: affective-sexual relations between partners with different HIV serology. The article analyzes issues that cannot be discussed within established relationships in these couples and/or with family, friends, and neighborhood networks. The article discusses two dimensions of silences and secrets in serodiscordant rel...
Disclosure and secrecy with mothers and best friends about personal, bad behavior, and multifaceted (e.g., staying out late) activities were examined using daily diaries among 102 ethnically diverse, urban middle adolescents (M = 15.18 years, SD = .89). Adolescents disclosed more and kept fewer secrets from best friends than from mothers and more frequently disclosed and kept secrets about thei...
Many RFID authentication protocols have been proposed to provide desired security and privacy level for RFID systems. Almost all of these protocols are based symmetric cryptography because of the limited resources of RFID tags. Recently Cheng et. al have been proposed an RFID security protocol based on chaotic maps. In this paper, we analyze the security of this protocol and discover its vulner...
This paper presents a new scheme for hiding two halftone secret images into two meaningful shares created from halftone cover images. Meaningful shares are more desirable than noiselike meaningless shares in Visual Secret Sharing because they look natural and do not attract eavesdroppers’ attention. Previous works in the field focus on either increasing number of secrets or creating meaningful ...
Data in an organisation often contains business secrets that organisations do not want to release. However, there are occasions when it is necessary for an organisation to release its data such as when outsourcing work or using the cloud for Data Quality (DQ) related tasks like data cleansing. Currently, there is no mechanism that allows organisations to release their data for DQ tasks while en...
In this paper, we present a passive attack for finding out the secrets used in MAP (Minimalist Mutual Authentication Protocol), which is an authentication protocol between RFID tags and RFID readers. We describe an algorithm that breaks the protocol after eavesdropping a few consecutive rounds of communication. After two eavesdropped runs of the protocol, the attacker can learn the identificati...
The heart and the brain had for thousands of years been considered the "noble" organs, organs shrouded in the deepest of mysteries, highly organized masses of tissues properly hidden from man's prying eyes and curious fingers. They were not to be touched under any circumstances ; they held the secrets of life and death and for that reason were sacred in the sight of God. So it was that for two ...
The visual secret sharing (VSS) scheme encrypts the secret information into various meaningless shares. These shares are distributed to the authorized participants and the secret information can be retrieved by any k out of n participants by stacking their respective shares on top of each other. This scheme uses HVS (Human Visual System) to decrypt the information, and thus no technical or fina...
This article analyses the organizational structure as well as the characteristics of development finance provided by Arab donor countries. This is done with a comparative view in relation to western donors and with the aim to develop recommendations as to how Arab development finance can be strengthened and rendered more effective for the new Millennium. In the 1960s and 1970s Arab donors estab...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید