نتایج جستجو برای: broadcast authentication

تعداد نتایج: 63999  

An independent broadcast on a connected graph $G$is a function $f:V(G)to mathbb{N}_0$such that, for every vertex $x$ of $G$, the value $f(x)$ is at most the eccentricity of $x$ in $G$,and $f(x)>0$ implies that $f(y)=0$ for every vertex $y$ of $G$ within distance at most $f(x)$ from $x$.The broadcast independence number $alpha_b(G)$ of $G$is the largest weight $sumlimits_{xin V(G)}f(x)$of an ind...

Journal: :تحقیقات آب و خاک ایران 0
علی اسدی کنگرشاهی مرکز تحقیقات کشاورزی و منابع طبیعی مازندران نگین اخلاقی امیری مرکز تحقیقات کشاورزی و منابع طبیعی مازندران محمد جعفر ملکوتی استاد، دانشگاه تربیت مدرس

the experiment in this study was conducted as a completely randomized block design with ten treatments and four replications. treatments included: to- control, t1- 50g of zn per tree as broadcast application, t2-100g zn per tree, broadcast application, t3- 200g zn per tree as broadcast application, t4- 50 g zn per tree as band application, t5- 50g zn per tree, band application, t6-100g zn per t...

1993
Francisco Jordan Manuel Medina

designed for the COMANDOS1 [1] distributed operating system platform, which may run on bare machines or over UNIX environments, using Internet protocols as a communication infrastructure. A secure transport service for secure communications between kernels was developed. As kernels use different transport protocols like TCP and UDP in broadcast, we implemented a general secure transport service...

2007
Kui Ren Wenjing Lou Fred J. Looft

A wireless sensor network (WSN) usually consists of a large number of small, lowcost devices that have limited energy supply, computation, memory, and communication capacities. Recently, WSNs have drawn a lot of attention due to their broad applications in both military and civilian domains. Communication security is essential to the success of WSN applications, especially for those mission-cri...

Journal: :transactions on combinatorics 2015
kian wee soh khee-meng koh

the broadcast domination number of the cartesian product of two cycles is completely determined.

The Internet of Things (IoT), is a new concept that its emergence has caused ubiquity of sensors in the human life. All data are collected, processed, and transmitted by these sensors. As the number of sensors increases,   the first challenge in establishing a secure connection is authentication between sensors. Anonymity, lightweight, and trust between entities are other main issues that shoul...

Journal: :isecure, the isc international journal of information security 0
m. safkhani computer engineering department, shahid rajaee teacher training university, tehran, iran n. bagheri electrical engineering department, shahid rajaee teacher training university, tehran, iran

recently, baghery et al. [1, 2] presented some attacks on two rfid protocols, namely yoon and jung et al. protocols, and proposed the improved version of them. however, in this note, we show that the improved version of the jung et al. protocol suffers from desynchronization attack and the improved version of the yoon's protocol suffers from secret disclosure attack. the success probabilit...

Journal: :avicenna journal of phytomedicine 0
mohammad reza joharchi ferdowsi university of mashhad, mashhad, i. r. iran mohammad sadegh amiri department of biology, payame noor university, tehran, i. r. iran

identification, authentication and quality control are essential to ensure safety, therapeutic potency, efficacy and reproducible quality of herbal medicines. the aim of this study is to use taxonomic method for authentication of traditional herbal drugs which are commonly sold in herbal shops in iran. in this regard, twenty-seven cases of herbal drugs suspected to be adulterated were investiga...

As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید